Buffer overflow protection

Results: 81



#Item
31Design of a secure system  Software Security Holes and Defenses  u Follows a ring design.

Design of a secure system Software Security Holes and Defenses u Follows a ring design.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-14 14:43:28
32Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 11:49:30
33RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2008-01-28 17:23:31
34RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
35A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam  Transmeta Corporation

A Practical Dynamic Buffer Overflow Detector Olatunji Ruwase Monica S. Lam Transmeta Corporation

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2003-11-22 16:45:00
36Computer programming / Buffer overflow / String / C / Stack buffer overflow / Buffer overflow protection / Computing / Software bugs / Software engineering

Programmers’ and Code Inspectors’ Checklist: Is every array index and pointer arithmetic operation… Okay given the preconditions and data assumptions?

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:20:11
37Converting OpenBSD to PIE  Pascal Stumpf <pascal@openbsd.org> AsiaBSDCon 2015, March 15, Tokyo  Pascal Stumpf: Converting OpenBSD to PIE

Converting OpenBSD to PIE Pascal Stumpf AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: www.openbsd.org

Language: English - Date: 2015-03-15 03:31:17
38Computer security / Buffer overflow / Stack buffer overflow / Vulnerability / Buffer overflow protection / Heap overflow / Software bugs / Software quality / Computing

= Very effective* = Effective* = Not effective N/A = not applicable *if well implemented Can Catch Buffer

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:19:53
39Guarded Memory Move (GMM) White Paper VERSION 0.5 Guarded Memory Move (GMM) Buffer Overflow Detection And Analysis Davide Libenzi

Guarded Memory Move (GMM) White Paper VERSION 0.5 Guarded Memory Move (GMM) Buffer Overflow Detection And Analysis Davide Libenzi

Add to Reading List

Source URL: www.xmailserver.org

Language: English - Date: 2007-02-16 03:03:26
40VIRUS BULLETIN www.virusbtn.com  EXPLOIT ANALYSIS ANI-HILATE THIS WEEK Peter Ferrie Symantec Security Response, USA

VIRUS BULLETIN www.virusbtn.com EXPLOIT ANALYSIS ANI-HILATE THIS WEEK Peter Ferrie Symantec Security Response, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20