Software bugs

Results: 1223



#Item
281Computer errors / Digital electronics / Digital media / Computer art / Glitch art / New media / Glitch / GLitcH! / Tin Man / Visual arts / Computing / Software bugs

Iman MoradiA dissertation submitted in partial fulfilment of the requirements for BA (Hons) degree in (Multimedia Design) T:

Add to Reading List

Source URL: www.haraldpeterstrom.com

Language: English - Date: 2010-05-04 17:24:50
282Software engineering / Buffer overflow / Pointer / Vulnerability / OpenBSD security features / Off-by-one error / Software bugs / Software quality / Computing

Taming Bugs The Art and Science of writing secure Code Paul Böhm http://www.sec-consult.com/

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:31
283Computer programming / Buffer overflow protection / Buffer overflow / Stack buffer overflow / C standard library / Code audit / Pointer / C / Stack / Computing / Software bugs / Software engineering

Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade* Crispin Cowan, Perry Wagle, Calton Pu, Steve Beattie, and Jonathan Walpole Department of Computer Science and Engineering Oregon Graduate Instit

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2013-04-04 20:24:06
284Bug tracking system / Debugging / Linux kernel / Open-source software / Open source software development / Software bugs / Software / Computing

Characterizing and Predicting Which Bugs Get Fixed: An Empirical Study of Microsoft Windows Philip J. Guo* Thomas Zimmermann+ Nachiappan Nagappan+ Brendan Murphy+ * Stanford University Microsoft Research

Add to Reading List

Source URL: pgbovine.net

Language: English - Date: 2014-01-03 23:24:44
285Computer programming / Buffer overflow / Off-by-one error / Pointer / Integer overflow / Circular buffer / String / Defensive programming / C / Software bugs / Computing / Software engineering

Taming Bugs The Art and Science of writing secure Code Paul Böhm

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
286Cyberwarfare / Software testing / Hacking / Greg Hoglund / Buffer overflow / Vulnerability / Exploit / Race condition / Software bugs / Software quality / Computing

Runtime Decompilation The ‘GreyBox’ process for Exploiting Software By: Greg Hoglund

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
287Software bugs / Process / Shellcode / Emulator / Honeypot / Buffer overflow / Client honeypot / Fork / QEMU / Computing / Software / System software

Eudaemon: Involuntary and On-Demand Emulation Against Zero-Day Exploits Georgios Portokalidis Herbert Bos

Add to Reading List

Source URL: www.cs.vu.nl

Language: English - Date: 2008-03-11 00:44:06
288Garbage collection / Memory management / Java virtual machine / Software / System software / Computing

jstat jstat Monitors Java Virtual Machine (JVM) statistics. This command is experimental and unsupported.

Add to Reading List

Source URL: bugs.openjdk.java.net

Language: English
289Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

Converting OpenBSD to PIE Pascal Stumpf <> AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: openbsd.comstyle.com

Language: English - Date: 2015-03-15 03:31:17
290Embedded operating systems / Cross-platform software / Procedural programming languages / OpenBSD / Software bugs / Address space layout randomization / Buffer overflow protection / C dynamic memory allocation / Pascal / Computing / Software / Computer programming

Converting OpenBSD to PIE Pascal Stumpf <> AsiaBSDCon 2015, March 15, Tokyo Pascal Stumpf: Converting OpenBSD to PIE

Add to Reading List

Source URL: www.openbsd.dk

Language: English - Date: 2015-03-15 03:31:17
UPDATE