Buffer overflow protection

Results: 81



#Item
31Software engineering / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Stack / C standard library / Setjmp.h / Denial-of-service attack / Write / Software bugs / Computing / Software quality

Design of a secure system Software Security Holes and Defenses u Follows a ring design.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-14 14:43:28
32Security / Software bugs / Software testing / Hacking / Vulnerability / Buffer overflow protection / Exploit / Attack / Buffer overflow / Cyberwarfare / Computer security / Computer network security

Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 11:49:30
33Data types / Software bugs / Computer arithmetic / Type theory / Type safety / Integer overflow / Signedness / Buffer overflow protection / C / Computing / Software engineering / Computer programming

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2008-01-28 17:23:31
34Data types / Software bugs / Computer arithmetic / Type theory / Type safety / Integer overflow / Signedness / Buffer overflow protection / C / Computing / Software engineering / Computer programming

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
35Software bugs / Data types / Computer errors / Primitive types / Arrays / Buffer overflow protection / Buffer overflow / Stack buffer overflow / Memory safety / Computing / Software engineering / Computer programming

A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam Transmeta Corporation

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2003-11-22 16:45:00
36Computer programming / Buffer overflow / String / C / Stack buffer overflow / Buffer overflow protection / Computing / Software bugs / Software engineering

Programmers’ and Code Inspectors’ Checklist: Is every array index and pointer arithmetic operation… Okay given the preconditions and data assumptions?

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:20:11
37Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

Converting OpenBSD to PIE Pascal Stumpf AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2015-03-15 03:31:17
38Computer security / Buffer overflow / Stack buffer overflow / Vulnerability / Buffer overflow protection / Heap overflow / Software bugs / Software quality / Computing

= Very effective* = Effective* = Not effective N/A = not applicable *if well implemented Can Catch Buffer

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:19:53
39Memory management / Computer errors / Software bugs / Computer memory / Buffer overflow protection / Segmentation fault / Buffer overflow / Call stack / GNU Debugger / Computing / Computer programming / Software engineering

Guarded Memory Move (GMM) White Paper VERSION 0.5 Guarded Memory Move (GMM) Buffer Overflow Detection And Analysis Davide Libenzi

Add to Reading List

Source URL: www.xmailserver.org

Language: English - Date: 2007-02-16 03:03:26
40Software bugs / Address space layout randomization / Microsoft Windows / Resource Interchange File Format / NX bit / ANI / Buffer overflow protection / Data Execution Prevention / Computer virus / Computer security / Computing / Cyberwarfare

VIRUS BULLETIN www.virusbtn.com EXPLOIT ANALYSIS ANI-HILATE THIS WEEK Peter Ferrie Symantec Security Response, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
UPDATE