Tagged articles
12 articles
Page 1 of 1
Liangxu Linux
Liangxu Linux
Feb 26, 2025 · Fundamentals

How Can a Function Jump to an Uncalled Routine? Exploring Stack Tricks and Process Switching

The article explains how operating‑system multitasking and process switching share the same underlying mechanism as function calls, demonstrates a C program that overwrites a return address to jump to an unexpected function, and shows the resulting assembly to illustrate the similarity between buffer‑overflow attacks and legitimate context switches.

AssemblyC Programmingbuffer overflow
0 likes · 7 min read
How Can a Function Jump to an Uncalled Routine? Exploring Stack Tricks and Process Switching
ITPUB
ITPUB
Feb 14, 2025 · Databases

Why Did Redis Crash at 100% Memory? Deep Dive into Buffer Overflows and Mitigation

An incident where massive key traffic pushed Redis memory usage to 100% revealed that buffer memory, not the dataset itself, exhausted the instance, leading to timeouts and crashes; the analysis explains the root causes, shows detailed INFO MEMORY output, and provides practical mitigation guidelines.

CacheKey DesignMemory Management
0 likes · 25 min read
Why Did Redis Crash at 100% Memory? Deep Dive into Buffer Overflows and Mitigation
Alibaba Cloud Developer
Alibaba Cloud Developer
Oct 15, 2024 · Databases

Why Did Redis Crash at 100% Memory? Uncovering Buffer Overflows and Best Practices

A detailed post‑mortem of a Redis outage shows how a traffic surge filled bandwidth, caused massive input and output buffers to consume almost all memory, and led to timeouts, while offering step‑by‑step analysis, memory diagnostics, and practical recommendations to prevent similar buffer‑overflow failures.

Operationsbest practicesbuffer overflow
0 likes · 22 min read
Why Did Redis Crash at 100% Memory? Uncovering Buffer Overflows and Best Practices
ByteDance Terminal Technology
ByteDance Terminal Technology
Apr 10, 2023 · Information Security

GWP‑ASan Based Heap Memory Error Detection and Debugging on Windows

This article explains how GWP‑ASan, a low‑overhead sampling memory‑sanitizer developed by Google, can be integrated on Windows to detect heap errors such as use‑after‑free, buffer‑underflow, buffer‑overflow and double‑free, describes its monitoring principles, hook implementation, crash‑report augmentation, and presents real‑world case studies and remediation strategies.

Gwp-ASanHeap DebuggingMemory Errors
0 likes · 21 min read
GWP‑ASan Based Heap Memory Error Detection and Debugging on Windows
58 Tech
58 Tech
Sep 4, 2020 · Information Security

Understanding ASLR and Buffer Overflow Exploits on Linux

This article explains the concept of Address Space Layout Randomization (ASLR), illustrates how buffer overflow attacks work on Linux, shows step‑by‑step exploitation with disabled ASLR, analyzes memory layout calculations, and discusses the impact of PIE and modern mitigation techniques.

ASLRExploitLinux security
0 likes · 6 min read
Understanding ASLR and Buffer Overflow Exploits on Linux
Liangxu Linux
Liangxu Linux
May 31, 2020 · Fundamentals

Detecting Memory Leaks and Errors with AddressSanitizer (ASan)

This guide explains how to use GCC's built‑in AddressSanitizer to detect memory leaks, heap/stack/global buffer overflows, use‑after‑free, and initialization‑order bugs, providing sample code, compilation flags, and example outputs for each error type.

AddressSanitizerC++ debuggingUse-After-Free
0 likes · 18 min read
Detecting Memory Leaks and Errors with AddressSanitizer (ASan)
ITPUB
ITPUB
Nov 1, 2016 · Information Security

How Linux Buffer Overflows Work and How to Defend Against Them

This article explains the mechanics of Linux buffer‑overflow attacks with concrete C and assembly examples, shows how to craft and execute shellcode, and demonstrates practical mitigation techniques such as using Libsafe with LD_PRELOAD to protect vulnerable programs.

LD_PRELOADLibsafeLinux security
0 likes · 23 min read
How Linux Buffer Overflows Work and How to Defend Against Them
ITPUB
ITPUB
Oct 31, 2016 · Information Security

Uncovering Linux Buffer Overflow Exploits: Stack Frames, Code Samples, and Defense

This article explains Linux process address space layout and stack‑frame structure, demonstrates a classic buffer‑overflow attack with full source code and compilation steps, analyzes how the exploit gains root privileges, and discusses why modern compilers and shells affect the attack's success.

Exploitbuffer overflowsecurity
0 likes · 15 min read
Uncovering Linux Buffer Overflow Exploits: Stack Frames, Code Samples, and Defense
21CTO
21CTO
Feb 6, 2016 · Information Security

Essential Web Application Security Checklist: From Input Validation to Server Hardening

This guide outlines a comprehensive security checklist covering form input validation, safe system call handling, buffer overflow prevention, strong password policies, session protection, mitigation of XSS, SQL injection, CSRF, Apache and MySQL hardening, PHP configuration, and fuzz testing techniques.

Password policyWeb Securityapache hardening
0 likes · 6 min read
Essential Web Application Security Checklist: From Input Validation to Server Hardening