Search

Your search keyword '"ASLR"' showing total 45 results

Search Constraints

Start Over You searched for: Descriptor "ASLR" Remove constraint Descriptor: "ASLR"
45 results on '"ASLR"'

Search Results

2. A compact tri-band bandpass filter using asymmetrical stub-loaded resonator.

3. fASLR: Function-Based ASLR for Resource-Constrained IoT Systems

4. Analysis of Firmware Security Mechanisms

6. ASLR: How Robust is the Randomness?

7. A Survey of Code Reuse Attack and Defense

8. A Modern Approach for Sign Language Interpretation Using Convolutional Neural Network

9. Identifying memory address disclosures

10. A Survey of Research on Runtime Rerandomization Under Memory Disclosure

11. Fine-grained address space layout randomization on program load

12. ASLR and ROP Attack Mitigations for ARM-Based Android Devices

13. Blender: Self-randomizing Address Space Layout for Android Apps

14. Towards Dynamic Software Diversity for Resilient Redundant Embedded Systems

15. Mitigating Return Oriented Programming.

16. eavesROP: Listening for ROP Payloads in Data Streams

18. A Review of Memory Errors Exploitation in x86-64

19. Fine-Grained Address Space Layout Randomization on Program Load.

20. Quantitative Metrics and Measurement Methodologies for System Security Assurance

21. Support for Secure Code Execution in Unix-Like Operating Systems.

22. Movement of the sacroiliac joint during the Active Straight Leg Raise test in patients with long-lasting severe sacroiliac joint pain.

23. INFLUENCE OF SEQUENCE OF JOINT MOVEMENT ON HAMSTRING LENGTH TEST RESULTS

24. TÉCNICAS DE OFENSA Y DEFENSA A LOS FALLOS POR CORRUPCIÓN DE MEMORIA Memory Corruption Failures Attack and Defense Techniques

25. Address Space Layout Randomization Comparative Analysis on Windows 10 and Ubuntu 18.04 LTS

26. Address Space Layout Randomization Comparative Analysis on Windows 10 and Ubuntu 18.04 LTS

27. ILR: Where'd My Gadgets Go?

28. A Review of Memory Errors Exploitation in x86-64

29. Fine-grained address space layout randomization on program load

30. LSE_Lex40_UVIGO: una base de datos específicamente diseñada para el desarrollo de tecnología de reconocimiento automático de LSE

31. Finding Focus in the Blur of Moving-Target Techniques.

32. TÉCNICAS DE OFENSA Y DEFENSA A LOS FALLOS POR CORRUPCIÓN DE MEMORIA.

33. Pelvic girdle pain, clinical tests and disability in late pregnancy.

34. A Review of Memory Errors Exploitation in x86-64.

35. Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR

36. Adding support for ELF binaries to PErmutator

37. Developing metamorphing engine for improving application immunity against computer viruses

38. Influência de diferentes estratégias de estabilização lombopélvica e de programas de exercícios de controlo motor no Active Straight Leg Raise

39. eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)

40. eavesROP: Listening for ROP Payloads in Data Streams

41. Timely address space rerandomization for resisting code reuse attacks.

42. Moving Target [Guest editors' introduction].

43. Threats to the Polish Baltic coastal zone by accelerated sea-level rise and the problem of coastal zone management/ Les menaces liées à l’élévation rapide du niveau de la mer sur le littoral polonais et le problème de la gestion de la zone côtière

44. The Security Challenges of Client-Side Just-in-Time Engines.

45. Mobile Attacks and Defense.

Catalog

Books, media, physical & digital resources