Overflow

Results: 1424



#Item
381Cyberwarfare / Buffer overflow / Stack buffer overflow / PaX / Memory safety / Return-to-libc attack / Address space layout randomization / Stack / Zero-day attack / Software bugs / Computer security / Computing

Chapter 1 Chapter 1 Introduction Even though memory corruption vulnerabilities are inherent to C, this language is

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2013-04-18 05:57:24
382Social psychology / Stack Overflow / Computing / Behavior / World Wide Web / Gender / Biology / Sociology

Men at work: the StackOverflow case Bogdan Vasilescu∗ , Andrea Capiluppi† , Alexander Serebrenik∗ ∗ Eindhoven University of Technology, The Netherlands

Add to Reading List

Source URL: tinytocs.org

Language: English - Date: 2013-04-02 18:41:25
383Computing / Software testing / Hacking / Vulnerability / Buffer overflow / Intrusion prevention system / Social vulnerability / Zero-day attack / Exploit / Cyberwarfare / Computer security / Computer network security

224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
384Software bugs / X86 architecture / Trusted Execution Technology / Trusted computing / Rootkit / Malware / X86 virtualization / Buffer overflow / Intel / System software / Computer security / Computing

Mitigating Exploits, Rootkits and Advanced Persistent Threats David Durham, Senior Principal Engineer Intel Corporation

Add to Reading List

Source URL: www.hotchips.org

Language: English - Date: 2014-08-10 23:56:01
385

The “URBAN” ceramic laundry sink. Modern design Manufactured in Italy 35 liters With basket waste and overflow 1 tap hole as standard, 3 tap hole available on request

Add to Reading List

Source URL: www.imaginebathrooms.com.au

- Date: 2012-04-30 00:55:44
    386Cyberwarfare / Buffer overflow / Stack buffer overflow / Vulnerability / PaX / Application checkpointing / Heap overflow / Valgrind / C standard library / Computing / Software bugs / Computer security

    Sweeper: A Lightweight End-to-End System for Defending Against Fast Worms James Newsome David Brumley Dawn Song

    Add to Reading List

    Source URL: users.ece.cmu.edu

    Language: English - Date: 2014-05-29 15:38:01
    387Biology / Urinary incontinence / Urology / Stress incontinence / Urination / Overflow incontinence / Pelvic floor / Urinary bladder / Kegel exercise / Medicine / Anatomy / Incontinence

    Tips on Healthy Ageing URINARY INCONTINENCE Urinary Incontinence affects one in 20 Australians (across all ages), and women are more likely to be affected than men. In older Australians, urinary incontinence is more com

    Add to Reading List

    Source URL: www.mednwh.unimelb.edu.au

    Language: English - Date: 2012-09-10 01:07:17
    388Environmental engineering / Civil engineering / Pollution / Sewage treatment / Sanitary sewer overflow / Acoustic Doppler Current Profiler / Sewage / Effluent / Vacuum sewerage / Water pollution / Sewerage / Environment

    An overview of contemporary hydrography in the city

    Add to Reading List

    Source URL: aha.net.au

    Language: English - Date: 2014-10-22 19:07:43
    389Heap overflow / C dynamic memory allocation / Memory corruption / Heap / Software engineering / Computer programming / Heap spraying / Memory management / Computing / Software bugs

    Attacking the Vista Heap Ben Hawkes v4 The Heap

    Add to Reading List

    Source URL: www.lateralsecurity.com

    Language: English - Date: 2015-03-04 17:36:24
    390Fluid dynamics / Computational science / Physical cosmology / Galaxies / Mars Science Laboratory / Mars exploration / Ames Research Center / Overflow / Magnetohydrodynamics / Physics / Space / Astronomy

    58 HIGH-END COMPUTING AT NASA 2007–2008 SCIENCE MISSION DIRECTORATE

    Add to Reading List

    Source URL: www.hec.nasa.gov

    Language: English - Date: 2009-08-07 18:35:18
    UPDATE