Software bugs

Results: 1223



#Item
121Java applet / Java platform / Java programming language / Internet Explorer / Computing / Software / Proprietary software

APPENDIX B: BUGS AND PROBLEMS TO DATE Whilst every effort has been made to fully test and eliminate all possible causes of bugs with the FriOWL-v3.1 software, it is still possible that occasional problems will arise fro

Add to Reading List

Source URL: www.iapmw.unibe.ch

Language: English - Date: 2008-11-04 06:04:51
122Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
123Data / Software engineering / Wireless sensor network / NesC / Model checking / Stack / Collection Tree Protocol / Java Pathfinder / Communications protocol / Software bugs / Computing / TinyOS

T-Check: Bug Finding for Sensor Networks Peng Li John Regehr School of Computing, University of Utah, USA

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2010-02-23 00:15:15
124Software bugs / C Standard Library / Stack buffer overflow / Buffer overflow / Subroutines / Address space layout randomization / Return-to-libc attack / NX bit / Pointer / Computing / Software engineering / Computer programming

2013 IEEE Symposium on Security and Privacy Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization Kevin Z. Snow, Fabian Monrose Department of Computer Science

Add to Reading List

Source URL: wwwx.cs.unc.edu

Language: English - Date: 2014-09-05 15:38:44
125Debuggers / Breakpoint / Debugging / Fortran / Subroutine / DBG / GNU Debugger / Computer programming / Computing / Software engineering

ICHEC Dr. Ruairi Nestor, ICHEC Computational Scientists Using a debugger with Abaqus subroutines Any reasonably large piece of code contains bugs. In scientific codes, bugs

Add to Reading List

Source URL: www.ichec.ie

Language: English - Date: 2013-01-09 06:55:57
126Software testing / Software bugs / Hacking / Source code / Vulnerability / Attack patterns / Application security / Cross-site scripting / Code injection / Cyberwarfare / Computer security / Computing

Microsoft Word - tcm_taxonomy_submission.doc

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:23
127Software bugs / Malware / PaX / Buffer overflow / Return-to-libc attack / Vulnerability / Address space layout randomization / Computer virus / Subroutine / Computing / Computer programming / Software engineering

Program Differentiation-INTERACT-2010-v6-publish

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2010-02-17 09:21:07
128Data types / Computer arithmetic / Primitive types / Type theory / Software bugs / Integer overflow / C / Type system / Bitwise operation / Computing / Software engineering / Computer programming

A Understanding Integer Overflow in C/C++1 WILL DIETZ, University of Illinois at Urbana-Champaign PENG LI and JOHN REGEHR, University of Utah VIKRAM ADVE, University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2015-04-28 14:40:24
129Computer programming / Buffer overflow protection / Stack buffer overflow / Buffer overflow / Stack / C standard library / Pointer / C / Subroutine / Computing / Software bugs / Software engineering

The following paper was originally published in the Proceedings of the 7th USENIX Security Symposium San Antonio, Texas, January 26-29, 1998 StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Atta

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2002-04-30 18:05:07
130Memory management / Software bugs / Debugging / C Standard Library / C dynamic memory allocation / Region-based memory management / Memory leak / Garbage collection / Memory debugger / Computing / Computer programming / Software engineering

Shredding Your Garbage: Reducing Data Lifetime Through Secure Deallocation Jim Chow, Ben Pfaff, Tal Garfinkel, Mendel Rosenblum {jchow,blp,talg,mendel}@cs.stanford.edu Stanford University Department of Computer Science

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2005-07-06 14:16:50
UPDATE