Tag

buffer overflow

0 views collected around this technical thread.

IT Services Circle
IT Services Circle
Dec 16, 2024 · Fundamentals

Understanding Process Switching Through Function Calls and Buffer‑Overflow Exploits

The article explains the essence of process switching by comparing it to function calls, demonstrates how manipulating a function's return address can redirect execution to another function, and shows the underlying assembly and security implications of such control‑flow changes.

Function CallOperating Systemassembly
0 likes · 7 min read
Understanding Process Switching Through Function Calls and Buffer‑Overflow Exploits
ByteDance Terminal Technology
ByteDance Terminal Technology
Apr 10, 2023 · Information Security

GWP‑ASan Based Heap Memory Error Detection and Debugging on Windows

This article explains how GWP‑ASan, a low‑overhead sampling memory‑sanitizer developed by Google, can be integrated on Windows to detect heap errors such as use‑after‑free, buffer‑underflow, buffer‑overflow and double‑free, describes its monitoring principles, hook implementation, crash‑report augmentation, and presents real‑world case studies and remediation strategies.

GWP‑ASanHeap DebuggingMemory Errors
0 likes · 21 min read
GWP‑ASan Based Heap Memory Error Detection and Debugging on Windows
58 Tech
58 Tech
Sep 4, 2020 · Information Security

Understanding ASLR and Buffer Overflow Exploits on Linux

This article explains the concept of Address Space Layout Randomization (ASLR), illustrates how buffer overflow attacks work on Linux, shows step‑by‑step exploitation with disabled ASLR, analyzes memory layout calculations, and discusses the impact of PIE and modern mitigation techniques.

ASLRLinux securityPIE
0 likes · 6 min read
Understanding ASLR and Buffer Overflow Exploits on Linux
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Jul 16, 2015 · Information Security

Analysis of a Node.js Buffer Overflow Vulnerability and Exploit Design

This article analyzes a Node.js buffer‑overflow vulnerability triggered by oversized UTF‑8 decoding, explains the underlying V8 call stack and key functions, demonstrates an exploit using crafted POST requests, and outlines the official security fix that adds proper bounds checking.

Node.jsPatchV8
0 likes · 11 min read
Analysis of a Node.js Buffer Overflow Vulnerability and Exploit Design