Integer overflow

Results: 37



#Item
11Computer security / Buffer overflow / Heap overflow / Circular buffer / Integer overflow / Vulnerability / Code injection / Pointer / Stack overflow / Computing / Software bugs / Cyberwarfare

Microsoft Word - CWEs_as_vuln_theory.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2007-07-18 14:25:17
12Data types / Computer arithmetic / Primitive types / Type theory / Software bugs / Integer overflow / C / Type system / Bitwise operation / Computing / Software engineering / Computer programming

A Understanding Integer Overflow in C/C++1 WILL DIETZ, University of Illinois at Urbana-Champaign PENG LI and JOHN REGEHR, University of Utah VIKRAM ADVE, University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2015-04-28 14:40:24
13Microsoft SQL Server / Stack buffer overflow / Circular buffer / Ip / SQL / ATS / X-Forwarded-For / Integer / Library / Computing / Software engineering / Relational database management systems

David Litchfield Database Security - The Pot and the Kettle This talk will examine the database server offerings from both Microsoft and Oracle and show that, regardless of certification, market campaigns and slurs, each

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
14Model theory / Semantics / Predicate logic / Formal languages / Metalogic / First-order logic / Alloy Analyzer / Alloy / Integer overflow / Logic / Mathematical logic / Mathematics

Preventing Arithmetic Overflows in Alloy Aleksandar Milicevica,∗, Daniel Jacksona a Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory,

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2014-07-07 17:53:08
15Data types / Computer arithmetic / C programming language / Primitive types / Procedural programming languages / Frama-C / Integer overflow / C / Undefined behavior / Computing / Software engineering / Computer programming

Annotation Generation Frama-C’s annotation generator plug-inCarbon version

Add to Reading List

Source URL: frama-c.com

Language: English - Date: 2013-09-24 04:53:50
16Data types / Computer arithmetic / C programming language / Primitive types / Procedural programming languages / Frama-C / Integer overflow / C / Undefined behavior / Computing / Software engineering / Computer programming

Annotation Generation Frama-C’s annotation generator plug-inCarbon version

Add to Reading List

Source URL: frama-c.com

Language: English - Date: 2013-09-24 04:53:50
17Software bugs / Pointer / Buffer overflow / C / Integer overflow / Type system / Java / Memory leak / Data type / Computing / Computer programming / Software engineering

Section 8.1 Introduction to Correctness and Robustness A PROGRAM is correct if it accomplishes the task that it was designed to perform. It is robust if it can handle illegal inputs and other unexpected situations in a

Add to Reading List

Source URL: www.saylor.org

Language: English - Date: 2013-03-20 16:15:11
18Computer programming / Buffer overflow / Off-by-one error / Pointer / Integer overflow / Circular buffer / String / Defensive programming / C / Software bugs / Computing / Software engineering

Taming Bugs The Art and Science of writing secure Code Paul Böhm

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
19Data types / Software bugs / Computer arithmetic / Type theory / Type safety / Integer overflow / Signedness / Buffer overflow protection / C / Computing / Software engineering / Computer programming

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2008-01-28 17:23:31
20Data types / Software bugs / Computer arithmetic / Type theory / Type safety / Integer overflow / Signedness / Buffer overflow protection / C / Computing / Software engineering / Computer programming

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
UPDATE