• Buffer overflow protection is any of various techniques used during software development to enhance the security of executable programs by detecting buffer...
    25 KB (2,836 words) - 13:59, 27 April 2025
  • Thumbnail for Buffer overflow
    information security, a buffer overflow or buffer overrun is an anomaly whereby a program writes data to a buffer beyond the buffer's allocated memory, overwriting...
    46 KB (5,132 words) - 08:55, 25 May 2025
  • Descriptors provide essential memory protection, security, safety, catching all attempts at out-of-bounds access and buffer overflow. Descriptors are a form of...
    22 KB (2,385 words) - 09:38, 3 June 2025
  • In software, a stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of the...
    22 KB (2,668 words) - 14:19, 8 June 2025
  • executable-space protection to mark writable memory areas, such as the stack and heap, as non-executable, helping to prevent buffer overflow exploits. These...
    21 KB (2,792 words) - 19:29, 30 May 2025
  • A heap overflow, heap overrun, or heap smashing is a type of buffer overflow that occurs in the heap data area. Heap overflows are exploitable in a different...
    6 KB (679 words) - 21:24, 1 May 2025
  • Function prologue and epilogue also sometimes contain code for buffer overflow protection. A function prologue typically does the following actions if the...
    5 KB (643 words) - 14:48, 14 April 2025
  • Thumbnail for Integer overflow
    unexpectedly small, potentially leading to a buffer overflow which, depending on the use of the buffer, might in turn cause arbitrary code execution...
    28 KB (3,308 words) - 08:57, 18 June 2025
  • file. Buffer overflow protection - with the introduction of garbage collection into C++, Managed C++ is less prone to the common buffer overflow errors...
    16 KB (2,127 words) - 23:12, 12 December 2023
  • perform exploits. Common hardening techniques are: Buffer overflow protection Stack overwriting protection Position independent executables and address space...
    3 KB (279 words) - 06:55, 29 August 2024
  • Thumbnail for Code segment
    Tan; Ji-yan Zheng; Yuan-Da Cao; Xue-lan Zhang (October 2005). Buffer overflow protection based on adjusting code segment limit. IEEE International Symposium...
    3 KB (335 words) - 13:02, 31 October 2024
  • Yong-Joon and Gyungho Lee, "Repairing return address stack for buffer overflow protection," Proceedings of the 1st conference on Computing frontiers, ACM...
    5 KB (393 words) - 19:49, 6 January 2025
  • "return-to-libc" attack is a computer security attack usually starting with a buffer overflow in which a subroutine return address on a call stack is replaced by...
    5 KB (587 words) - 01:42, 8 November 2024
  • run Windows Mobile, released in November 2002 Canary value, a buffer overflow protection method in computer programming Canary, LLC, an oilfield services...
    4 KB (496 words) - 17:32, 27 March 2025
  • ensures that there will be protection against insider attacks and reduces the threat to application security. Buffer overflows, a common software security...
    8 KB (988 words) - 17:30, 1 September 2024
  • Wouter Joosen; Frank Piessens (2013-02-25). "Efficient protection against heap-based buffer overflows without resorting to magic" (PDF). Dept. of Computer...
    5 KB (456 words) - 19:58, 25 July 2024
  • Thumbnail for Ubuntu
    Ubuntu compiles its packages using GCC features such as PIE and buffer overflow protection to harden its software.[relevant? – discuss] These extra features...
    135 KB (10,142 words) - 16:10, 17 June 2025
  • Thumbnail for Debian
    of its software by default using gcc features such as PIE and buffer overflow protection, unlike operating systems such as OpenBSD, but tries to build...
    152 KB (13,049 words) - 20:57, 17 June 2025
  • protecting a procedure's stored return address, such as from a stack buffer overflow. The shadow stack itself is a second, separate stack that "shadows"...
    6 KB (590 words) - 16:22, 3 May 2025
  • exploitation of buffer overflow bugs by marking the memory where data is written as non-executable, a technique known as executable-space protection. With this...
    31 KB (3,850 words) - 21:06, 16 June 2025
  • of a computer program's memory that helps software developers find buffer overflows while developing the program. When a program is compiled for debugging...
    3 KB (453 words) - 19:43, 19 September 2024
  • points to memory that has been freed/deallocated/deleted) A buffer overflow A stack overflow Attempting to execute a program that does not compile correctly...
    19 KB (2,431 words) - 08:02, 13 April 2025
  • compares the value in r10 to the target function's stored hash. Buffer overflow protection Payer, Mathias. "Control-Flow Integrity: An Introduction". nebelwelt...
    19 KB (1,834 words) - 11:42, 25 March 2025
  • term as defined above is distinct from buffer overflow, a condition where a portion of memory forms a buffer of a fixed size yet is filled with more...
    5 KB (767 words) - 17:49, 22 August 2024
  • (unless suitable memory protection software is being used). Using memory beyond the memory that was allocated (buffer overflow): If an array is used in...
    4 KB (478 words) - 16:46, 22 July 2023
  • control-flow integrity techniques, including stack canaries, buffer overflow protection, shadow stacks, and vtable pointer verification, are used to defend...
    61 KB (6,038 words) - 19:45, 23 May 2025
  • directly mapped shadow memory to detect memory corruption such as buffer overflows or accesses to a dangling pointer (use-after-free). Google's ASan,...
    15 KB (1,483 words) - 08:55, 19 February 2025
  • into another program’s data storage area and execute it, such as in a buffer overflow attack. The term "NX bit" was introduced by Advanced Micro Devices...
    10 KB (1,167 words) - 12:37, 3 May 2025
  • Thumbnail for HP-UX
    kernel-based intrusion detection, strong random number generation, stack buffer overflow protection, security partitioning, role-based access management, and various...
    28 KB (2,998 words) - 20:24, 21 November 2024
  • Thumbnail for Crash (computing)
    memory addresses, incorrect address values in the program counter, buffer overflow, overwriting a portion of the affected program code due to an earlier...
    13 KB (1,424 words) - 06:49, 10 April 2025