Buffer overflow

Results: 538



#Item
231Cyberwarfare / Buffer overflow / Stack buffer overflow / Vulnerability / Stack overflow / Splint / Attack / Computer virus / Stack / Software bugs / Computing / Software quality

2-4 Buffer-Overflow Detection in C Program by Static Detection NAKAMURA Goichi, MAKINO Kyoko, and MURASE Ichiro Buffer_overflow is the most dangerous vulnerability implicit in C programs. whether a Buffer_oveflow emerges

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:56:01
232Software bugs / Internet standards / Units of information / Denial-of-service attacks / SQL Slammer / Computer network security / Witty / Stack buffer overflow / User Datagram Protocol / Computing / Network architecture / Internet

VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS 2 CHIBA WITTY BLUES Peter Ferrie, Frédéric Perriot, Péter Ször Symantec, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
233Computer programming / Buffer overflow / String / C / Stack buffer overflow / Buffer overflow protection / Computing / Software bugs / Software engineering

Programmers’ and Code Inspectors’ Checklist: Is every array index and pointer arithmetic operation… Okay given the preconditions and data assumptions?

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:20:11
234Computing / Software bugs / Sasser / Welchia / Blaster / Buffer overflow / Stack buffer overflow / Agobot / Windows / System software / Software / Computer worms

VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS 2 MOSTL Y HARMLESS MOSTLY

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:43:27
235Control flow / Computer virus / Address space layout randomization / COM file / Microsoft-specific exception handling mechanisms / Dynamic-link library / Relocation / Buffer overflow / Portable Executable / Computing / Software / System software

VIRUS BULLETIN www.virusbtn.com MALWARE ANALYSIS 1 ANOTHER TUSSLE WITH TUSSIE Peter Ferrie Microsoft, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2013-12-03 23:26:36
236Computer network security / Hacking / Security / Attack patterns / Vulnerability / Application security / Penetration test / Buffer overflow / Port scanner / Computer security / Cyberwarfare / Software testing

Matching Attack Signatures to Security Vulnerabilities in Software-Intensive System Designs

Add to Reading List

Source URL: collaboration.csc.ncsu.edu

Language: English - Date: 2013-04-11 05:18:10
237Hacking / Software testing / Vulnerability / Cross-site scripting / SQL injection / Social vulnerability / Arbitrary code execution / Privilege escalation / Buffer overflow / Computer security / Cyberwarfare / Software

! [removed]: [removed]: [removed]: [removed]: [removed]:

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2005-05-20 17:27:56
238Computer programming / Arrays / Data types / Primitive types / Computer errors / Buffer overflow / Scanf format string / Circular buffer / C / Computing / Software engineering / Software bugs

Programmer’s Points to Remember: Always do bounds checking on arrays. Always do bounds checking on pointer arithmetic.

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:20:26
239Frisian languages / Languages of Germany / Ü / Buffer overflow / Latin alphabets

üü = Very effective* ü = Effective* O = Not effective N/A = not applicable *if well implemented Testing

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:19:56
240Software engineering / Arrays / Computer errors / Buffer overflow / C Standard Library / Scanf format string / Ü / C / Bounds checking / Computing / Software bugs / Computer programming

Programmer’s Points to Remember: ü Always do bounds checking on arrays. ü Always do bounds checking on pointer arithmetic. ü Before you copy to, format, or send input to a buffer make sure it is big enough to hold w

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:20:36
UPDATE