Software bugs

Results: 1223



#Item
421Software engineering / Software testing / Logic in computer science / Automated theorem proving / Concolic testing / Symbolic execution / Buffer overflow / Predicate transformer semantics / Precondition / Theoretical computer science / Software bugs / Mathematics

AEG: Automatic Exploit Generation Thanassis Avgerinos, Sang Kil Cha, Brent Lim Tze Hao and David Brumley Carnegie Mellon University, Pittsburgh, PA {thanassis, sangkilc, brentlim, dbrumley}@cmu.edu Abstract

Add to Reading List

Source URL: security.ece.cmu.edu

Language: English - Date: 2011-05-02 14:34:52
422Software bugs / Address space layout randomization / Shellcode / PaX / Buffer overflow / Data Execution Prevention / Return-oriented programming / Grsecurity / Arbitrary code execution / Computer security / Cyberwarfare / Computing

security The Danger of Unrandomized Code E d w a r d J . Sc h w a r t z Ed is currently working on his

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-14 20:45:31
423Memory management / Data types / Primitive types / Cross-platform software / Garbage collection / Software bugs / Pointer / Reference / Region-based memory management / Software engineering / Computing / Computer programming

Comparing Mostly-Copying and Mark-Sweep Conservative Collection  Frederick Smith y Cornell University [removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 1999-04-14 16:12:27
424Software bugs / Measurement / Error detection and correction / Computer errors / Data types / OpenOffice.org Calc / Year 10 / 000 problem / Infinite loop / Error message / Computing / Computer programming / Software engineering

Calc Guide C Appendix Calc Error Codes

Add to Reading List

Source URL: wiki.openoffice.org

Language: English - Date: 2011-04-28 17:49:50
425C POSIX library / Software bugs / Ln / File system / Filesystem permissions / Write / Unlink / Computing / Time of check to time of use / Chmod

Program analysis for security: Making it scale David Wagner U.C. Berkeley

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:42
426Software testing / Software bugs / Computer network security / Hacking / Coverity / Vulnerability / Application security / Social vulnerability / Fortify Software / Cyberwarfare / Computer security / Software quality

Manual vs. Automated Vulnerability Assessment: A Case Study James A. Kupsch and Barton P. Miller Computer Sciences Department, University of Wisconsin, Madison, WI, USA {kupsch,bart}@cs.wisc.edu Abstract

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2009-06-01 10:19:43
427Programming language implementation / C++ / Data types / Type theory / LLVM / Clang / Software bug / GNU Compiler Collection / C / Software / Computing / Compilers

Finding and Understanding Bugs in C Compilers Xuejun Yang Yang Chen Eric Eide

Add to Reading List

Source URL: www.cs.utah.edu

Language: English - Date: 2011-03-18 11:45:03
428Data types / Software bugs / Computer arithmetic / Type theory / Type safety / Integer overflow / Signedness / Buffer overflow protection / C / Computing / Software engineering / Computer programming

RICH: Automatically Protecting Against Integer-Based Vulnerabilities David Brumley, Tzi-cker Chiueh, Robert Johnson [removed], [removed], [removed] Huijia Lin, Dawn Song [removed]el

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
429Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu [removed] [removed]

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
430Cyberwarfare / Stack buffer overflow / Buffer overflow / Uncontrolled format string / Vulnerability / Valgrind / C / Malware / Pointer / Computing / Software bugs / Software engineering

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome [removed] Carnegie Mellon University Abstract

Add to Reading List

Source URL: valgrind.org

Language: English - Date: 2006-08-12 00:33:35
UPDATE