Overflow

Results: 1424



#Item
361Software engineering / Software testing / Logic in computer science / Automated theorem proving / Concolic testing / Symbolic execution / Buffer overflow / Predicate transformer semantics / Precondition / Theoretical computer science / Software bugs / Mathematics

AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
362Software quality / Software testing / Shellcode / Buffer overflow / Arbitrary code execution / Heap overflow / Address space layout randomization / Fuzz testing / Return-to-libc attack / Computer security / Cyberwarfare / Software bugs

doi:[removed][removed]The idea is to identify security-critical software bugs so they can be fixed first. By Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, and David Brumle

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
363Computability theory / Theoretical computer science / Software testing / Hacking / Vulnerability / Social vulnerability / Buffer overflow / Electronic signature / Halting problem / Mathematics / Applied mathematics / Computer science

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
364Software bugs / Debuggers / Buffer overflow / Electronic filter / Filter / Vulnerability / Valgrind / Instruction set / Computing / Computer programming / Cyberwarfare

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software James Newsome Carnegie Mellon University [removed]

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
365Software engineering / Software testing / Logic in computer science / Automated theorem proving / Concolic testing / Symbolic execution / Buffer overflow / Predicate transformer semantics / Precondition / Theoretical computer science / Software bugs / Mathematics

AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

Add to Reading List

Source URL: security.ece.cmu.edu

Language: English - Date: 2011-05-02 14:34:52
366Software bugs / Address space layout randomization / Shellcode / PaX / Buffer overflow / Data Execution Prevention / Return-oriented programming / Grsecurity / Arbitrary code execution / Computer security / Cyberwarfare / Computing

security The Danger of Unrandomized Code E d w a r d J . Sc h w a r t z Ed is currently working on his

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-14 20:45:31
367Symbolic execution / David Brumley / Higher education / Academia / Computer programming / Taint checking / Carnegie Mellon University

All You Ever Wanted to Know About Dynamic Taint Analysis & Forward Symbolic Execution (but might have been afraid to ask) (Yes, we were trying to overflow the title length field

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2010-08-16 00:26:51
368Computer programming / Data-flow analysis / Pointer / Application security / SQL / Buffer overflow / Dataflow / Taint checking / Computing / Software engineering / Computer security

Dytan: A Generic Dynamic Taint Analysis Framework James Clause, Wanchun Li, and Alessandro Orso College of Computing Georgia Institute of Technology {clause|wli7|orso}@cc.gatech.edu

Add to Reading List

Source URL: www.cc.gatech.edu

Language: English - Date: 2007-07-12 05:25:09
369Nuclear technology / Slosh dynamics / SFP / Spent fuel pool / Kashiwazaki-Kariwa Nuclear Power Plant / Properties of water / Chemistry / Matter / Fluid dynamics

Principal Research Results Numerical Simulation for Overflow Behavior of Water from Spent Fuel Pool with Sloshing in the 2007 Niigata-ken Chuetsu-oki Earthquake Background In order to evaluate overflow behavior of water

Add to Reading List

Source URL: criepi.denken.or.jp

Language: English - Date: 2009-03-04 02:31:15
370Data types / Software bugs / Computer arithmetic / Type theory / Type safety / Integer overflow / Signedness / Buffer overflow protection / C / Computing / Software engineering / Computer programming

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
UPDATE