Overflow

Results: 1424



#Item
351Computer programming / Pointer / Dangling pointer / Stack buffer overflow / Memory safety / Address space layout randomization / Buffer overflow / C / Memory corruption / Computing / Software engineering / Software bugs

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
352Malware / Hacking / Software testing / Buffer overflow / Vulnerability / Computer worm / Computer virus / Social vulnerability / Cyberwarfare / Computer security / Failure

Sting: An End-to-End Self-Healing System for Defending against Internet Worms David Brumley1 , James Newsome2 , and Dawn Song3 1 2 3

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
353Object-oriented programming / Virtual method table / Data types / Software bugs / Select / Pointer / Buffer overflow protection / Dynamic-link library / Fortran / Computing / Software engineering / Computer programming

VTint: Protecting Virtual Function Tables’ Integrity Chao Zhang∗ , Chengyu Song‡ , Kevin Zhijie Chen∗ , Zhaofeng Chen† , Dawn Song∗ ∗ University of California, Berkeley {chaoz, kevinchn, dawnsong}@cs.berkel

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2015-02-07 13:00:50
354C dynamic memory allocation / Data segment / Mmap / Buffer overflow / Virtual memory / Out of memory / Pointer / Segmentation fault / 64-bit / Memory management / Computing / Computer memory

Large memory management vulnerabilities System, compiler, and application issues Gaël Delalleau

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-07 19:38:54
355Software engineering / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Stack / C standard library / Setjmp.h / Denial-of-service attack / Write / Software bugs / Computing / Software quality

Design of a secure system Software Security Holes and Defenses u Follows a ring design.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-14 14:43:28
356Applied mathematics / Computational biology / Community websites / Mathematical and theoretical biology / Stack Overflow / Galaxy / EMBnet / Bioinformatics / Science / Biology

Perspective BioStar: An Online Question & Answer Resource for the Bioinformatics Community Laurence D. Parnell1, Pierre Lindenbaum2, Khader Shameer3, Giovanni Marco Dall’Olio4, Daniel C. Swan5, Lars Juhl Jensen6, Simo

Add to Reading List

Source URL: www.directeffectmedia.com

Language: English - Date: 2015-04-09 18:06:04
357Security / Software bugs / Software testing / Hacking / Vulnerability / Buffer overflow protection / Exploit / Attack / Buffer overflow / Cyberwarfare / Computer security / Computer network security

Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 11:49:30
358Marketing / Methodology / Electronic commerce / Web portal / Application software / Project management

INFOLUTION SOLVING INFORMATION COMPLEXITY Information overflow demands smart solutions. www.HowardsHome.com

Add to Reading List

Source URL: www.infolution.com

Language: English - Date: 2008-06-19 10:10:59
359Data types / Software bugs / Computer arithmetic / Type theory / Type safety / Integer overflow / Signedness / Buffer overflow protection / C / Computing / Software engineering / Computer programming

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2008-01-28 17:23:31
360C Standard Library / Return-to-libc attack / Address space layout randomization / Buffer overflow / GADGET / MOV / Shellcode / NX bit / Instruction selection / Computer architecture / Computing / Software bugs

Q: Exploit Hardening Made Easy Edward J. Schwartz, Thanassis Avgerinos and David Brumley Carnegie Mellon University, Pittsburgh, PA {edmcman, thanassis, dbrumley}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
UPDATE