Hacking [Electronic resources] : The Art of Exploitation

Jon Erickson

نسخه متنی -صفحه : 60/ 39
نمايش فراداده

Index

B

banner data file, 171

banner response packet, 170

BB84 quantum key distribution scheme, 176

Bennett, Charles, 176

big-oh notation, 178

binary matrix, three-dimensional, 202

birthday paradox, 215

block ciphers, 178-79

branch instructions, 18

Brassard, Gilles, 176

brute-force attacks, 199-200, 214-15

bss_game.c code, 47-54

bss-based overflows. See heap- and bss-based overflows

bss segments, 19

buffers, 17, 20, 22

overflow, 22-23

overrun, 22

bytecode injection, 24