Buffer overflow

Results: 538



#Item
81Leaky bucket / Symbol / Beta code

Buffer overflow bounds for multiplexed regulated traffic streams F. M. Guillemin1 , N. Likhanov2 , R. R. Mazumdar, C. Rosenberg and Yu Ying3 Abstract In this paper, we present performance bounds for multiplexed traffic s

Add to Reading List

Source URL: ece.uwaterloo.ca

Language: English - Date: 2003-01-27 22:03:04
82Computer file formats / Dynamic-link library / Software bugs / Hooking / Portable Executable / Stack / Stack buffer overflow / Buffer overflow / Computing / Software / Shellcode

The shellcode basically resolves kernel32 functions, downloads, and executes xx

Add to Reading List

Source URL: www.mnin.org

Language: English - Date: 2007-03-30 15:11:52
83C++ / C++ classes / Novell NetWare / ALGOL 68 / Ip / Pointer / Computing / Computer programming / Software engineering

A stack buffer overflow vulnerability exists in the

Add to Reading List

Source URL: www.mnin.org

Language: English - Date: 2006-10-21 04:10:32
84Software engineering / Buffer overflow / Heap overflow / Stack buffer overflow / Uncontrolled format string / Stack overflow / Circular buffer / Malware / Computer virus / Software bugs / Computing / Software quality

10061872_blended_attacks_wp.qxp

Add to Reading List

Source URL: www.cse.msu.edu

Language: English - Date: 2004-07-12 15:53:15
85Poisson process / Mathematical sciences / Markov processes / Stochastic processes / Leaky bucket

Buffer Overflow Asymptotics for Multiplexed Regulated Traffic Y. Ying a, F. Guillemin b, R. Mazumdar c and C. Rosenberg c a School of ECE, Purdue University, West Lafayette, IN, 47906, U.S.A.

Add to Reading List

Source URL: ece.uwaterloo.ca

Language: English - Date: 2007-10-16 10:14:14
86Security / Risk / Software testing / CVSS / Hacking / Vulnerability / Exploit / Buffer overflow / Social vulnerability / Cyberwarfare / Computer security / Computer network security

CVSS v3.0 Preview 2: Metrics / Formula / Examples FIRST.ORG December 2014 Introduction .....................................................................................................................................

Add to Reading List

Source URL: www.first.org

Language: English
87Microsoft SQL Server / Stack buffer overflow / Circular buffer / Ip / SQL / ATS / X-Forwarded-For / Integer / Library / Computing / Software engineering / Relational database management systems

David Litchfield Database Security - The Pot and the Kettle This talk will examine the database server offerings from both Microsoft and Oracle and show that, regardless of certification, market campaigns and slurs, each

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
88Network architecture / Internet standards / Telnet / Transmission Control Protocol / Portmap / Secure Shell / Port / Ident / Netstat / Internet protocols / Computing / Internet

Lecture 21: Buffer Overflow Attack Lecture Notes on “Computer and Network Security” by Avi Kak () April 2, 2015 3:58pm

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-02 15:59:28
89Software bugs / X86 architecture / Computer programming / Assembly languages / Computer errors / MOV / Buffer overflow / Shellcode / Stack buffer overflow / Computing / X86 instructions / Software engineering

Variations in Exploit methods between Linux and Windows David Litchfieldth July 2003 This paper will examine the differences and commonality in the way a vulnerability common to both Windows a

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:39
90Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security

Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:18
UPDATE