Overflow

Results: 1424



#Item
341Software bugs / Memory management / Software testing / Control flow / Daikon / Exception handling / Invariant / Buffer overflow / Call stack / Computing / Software engineering / Computer programming

Automatically Patching Errors in Deployed Software Jeff H. Perkinsα , Sunghun Kimβ , Sam Larsenγ , Saman Amarasingheα , Jonathan Bachrachα , Michael Carbinα , Carlos Pachecoδ , Frank Sherwood, Stelios Sidiroglouα

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2012-06-14 09:36:59
342Irrigation / Architecture / Water / Fasteners / Valves / Electrical connector / Tap / Nut / Pipe / Plumbing / Construction / Piping

NUGLEAM LAUNDRY UNITS ASSEMBLY & INSTALLATION INSTRUCTIONS BOWLS WITH SINGLE BY-PASS / OVERFLOW CONNECTION Each carton contains a laundry bowl and cabinet, with a plastic bag holding the following items : 1 : One Waste O

Add to Reading List

Source URL: www.everhard.com.au

Language: English - Date: 2014-06-04 01:25:24
343Bathrooms / Fasteners / Screws / Electrical connectors / Nut / Tap / Screw terminal / Seal / T-nut / Construction / Plumbing / Architecture

NUGLEAM BENCHLINE LAUNDRY BOWLS WITH SINGLE BY-PASS / OVERFLOW CONNECTION ASSEMBLY & INSTALLATION INSTRUCTIONS Each carton contains a laundry bowl, with a plastic bag holding the following items : 1

Add to Reading List

Source URL: www.everhard.com.au

Language: English - Date: 2014-06-04 02:29:47
344Software engineering / Buffer overflow / Stack buffer overflow / PaX / Address space layout randomization / Vulnerability / Memory safety / Pointer / Uncontrolled format string / Computing / Software bugs / Computer security

Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers ∗ Zhenkai Liang and R. Sekar Dept. of Computer Science, Stony Brook University

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-08-03 23:33:34
345Compiler construction / Software bugs / Pointer / Branch table / Relocation / JMP / Subroutine / Buffer overflow / Control table / Computing / Software engineering / Computer programming

Practical Control Flow Integrity & Randomization for Binary Executables Chao Zhang1 , Tao Wei1,2∗ , Zhaofeng Chen1 , Lei Duan1 , L´aszl´o Szekeres2,3+ , Stephen McCamant2,4+ , Dawn Song2 , Wei Zou1 1 Beijing Key Lab

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
346Software bugs / Computer errors / Memory management / Stack overflow / Stack / Call stack / ThreadX / Subroutine / C dynamic memory allocation / Computing / Software engineering / Computer programming

Helping you avoid stack overflow crashes! One of the toughest (and unfortunately common) problems in embedded systems is stack overflows and the collateral corruption that it can cause. As a result, we have spent consid

Add to Reading List

Source URL: rtos.com

Language: English - Date: 2010-11-12 18:36:33
347Water / Environmental engineering / Earth / Environmental science / Technical terminology / Wastewater / Reclaimed water / Effluent / Sanitary sewer overflow / Environment / Water pollution / Sewerage

Code of practice for wastewater overflow management

Add to Reading List

Source URL: www.epa.sa.gov.au

Language: English - Date: 2010-04-29 01:31:13
348Failure / Code Red / Hacking / Software testing / Vulnerability / Buffer overflow / Computer virus / Computer worm / Attack / Cyberwarfare / Computer security / Computer network security

Microsoft Word - PrestonLoftonEiC.doc

Add to Reading List

Source URL: www.mcandl.com

Language: English - Date: 2012-06-07 14:18:01
349Computability theory / Theoretical computer science / Software testing / Hacking / Vulnerability / Social vulnerability / Buffer overflow / Electronic signature / Halting problem / Mathematics / Applied mathematics / Computer science

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
350Computer security / Buffer overflow / Vulnerability / Valgrind / Uncontrolled format string / Intrusion detection system / Cyberwarfare / Software bugs / Computing

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Dawn Song May 2004

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
UPDATE