Overflow

Results: 1424



#Item
221Computer security / Computer file formats / Software testing / Zero-day attack / Vulnerability / Buffer overflow / Uncontrolled format string / String / File format / Computing / Cyberwarfare / Computer network security

The Art of File Format Fuzzing In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
222Computer network security / Failure / Zero-day attack / Buffer overflow / Vulnerability / Cyberwarfare / Computer security / Software testing

0002b510h: 0002b520h: 0002b530h: 0002b540h: 0002b550h: 0002b560h:

Add to Reading List

Source URL: www.blackhat.com

Language: English
223Software bugs / Software testing / Automated theorem proving / Concolic testing / Buffer overflow / Symbolic execution / Arithmetic overflow / String / C / Software engineering / Computing / Computer programming

University of California Los Angeles Symbolic Execution Algorithms for Test Generation

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2012-11-23 07:14:40
224Software bugs / Data types / Source code / Procedural programming languages / Pointer / C / Abstract interpretation / Static program analysis / Buffer overflow / Software engineering / Computing / Computer programming

Innovations in Systems and Software Engineering manuscript No. (will be inserted by the editor) Model Checking Driven Static Analysis for the Real World Designing and Tuning Large Scale Bug Detection Ansgar Fehnker · Ra

Add to Reading List

Source URL: www.cse.unsw.edu.au

Language: English - Date: 2013-01-01 18:09:41
225Americas / Meteorology / Bruce Jakosky / Western Hemisphere Warm Pool / EVI / Atmospheric sciences / Climatology

Anderson, W., 2004: Oceanic Sill-Overflow Systems: Investigation and Simulation with the Poseidon Ocean General Circulation Model. Ph.D. Dissertation, George Mason University. Boone, A., F. Habets, J. Noilhan, E. Blyth,

Add to Reading List

Source URL: iges.org

Language: English - Date: 2006-09-06 15:20:07
226Computer network security / Shellcode / Software bugs / Polymorphic code / Buffer overflow / Metasploit Project / Exploit / Conficker / Computer virus / Cyberwarfare / Computer security / Computing

Real-world Polymorphic Attack Detection Michalis Polychronakis,1 Kostas G. Anagnostakis,2 Evangelos P. Markatos1 1 Institute of Computer Science, Foundation for Research & Technology – Hellas, {mikepo, markatos}@ics.fo

Add to Reading List

Source URL: www.ics.forth.gr

Language: English - Date: 2012-03-22 09:28:01
227Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming

Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:02
228Computer programming / Computer errors / Address space layout randomization / Buffer overflow / C / Segmentation fault / Stack / Return-to-libc attack / Stack buffer overflow / Computing / Software bugs / Software engineering

Computer Science HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities Jason Gionta, William Enck,

Add to Reading List

Source URL: gionta.org

Language: English - Date: 2015-03-05 07:19:22
229Cyberwarfare / Buffer overflow / Exploit / GNU Debugger / Stack / Buffer overflow protection / Shellcode / Software bugs / Computing / Computer programming

CS 395, Section 22 Introduction to Computer Systems Dinda, Fall 2001

Add to Reading List

Source URL: www.cs.northwestern.edu

Language: English - Date: 2003-01-31 17:41:14
230Engineering / Rain gutter / Roofline / Leader head / Downspout / Roof / Flashing / Roofs / Architecture / Construction

Leader heads function as funnels that alleviate overflow of water and ice buildup at the roofline. Our

Add to Reading List

Source URL: www.bbsheetmetal.com

Language: English - Date: 2006-09-26 17:36:12
UPDATE