Software bugs

Results: 1223



#Item
961Phyla / Protostome / Parasites / Bed bug / Beds / Starship Troopers / Mattress / Bed / Software bug / Bedding / Home / Hemiptera

Stop Bed Bugs Fact Sheet Eng.qxp:8x11, 2-Sided

Add to Reading List

Source URL: www.nyc.gov

Language: English - Date: 2009-01-14 10:32:08
962Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2010-12-28 00:16:40
963Software testing / OpenSolaris / Solaris / Programmer / Security bug / Computer programming / Software bugs / Computing / Software

OPG Leadership Series Solaris Security Design Kickoff, Considerations September, 2005

Add to Reading List

Source URL: www.terena.org

Language: English - Date: 2006-01-25 04:53:05
964Software bugs / Memory management / Heap overflow / Buffer overflow / Heap spraying / C dynamic memory allocation / Address space layout randomization / Shellcode / Dynamic-link library / Computing / Software engineering / Computer programming

Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit I decided to write a quick document about the techniques I used to exploit Internet Explorer 8 on windows 7 with ASLR and DEP enabled. The exploit consists of two parts.

Add to Reading List

Source URL: vreugdenhilresearch.nl

Language: English - Date: 2010-03-24 14:09:15
965G8 / Political geography / Earth / Coverity / Japan External Trade Organization / Japan

JAPAN EXTERNAL TRADE ORGANIZATION Past JETRO Client COVERITY, INC. July 2009 – With origins in the Computer Systems Laboratory at Stanford University, Coverity Inc. develops software tools that detect bugs in source c

Add to Reading List

Source URL: www.jetro.go.jp

Language: English - Date: 2014-08-06 04:26:46
966Software quality / Stack buffer overflow / Shellcode / Vulnerability / Stack / X86 instruction listings / Pointer / X86 / Exploit / Computing / Software bugs / Cyberwarfare

University of Oxford Computing Laboratory MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities

Add to Reading List

Source URL: seanhn.files.wordpress.com

Language: English - Date: 2009-09-06 11:29:07
967Software bugs / Memory management / Fault injection / Software testing / Pointer / C dynamic memory allocation / Memory corruption / C / Exception handling / Computing / Software engineering / Computer programming

An Empirical Study of Injected versus Actual Interface Errors Anna Lanzaro Roberto Natella

Add to Reading List

Source URL: www1.deeds.informatik.tu-darmstadt.de

Language: English - Date: 2014-02-05 17:09:16
968Bug tracking system / Debugging / Linux kernel / Open-source software / Open source software development / Software bugs / Software / Computing

Characterizing and Predicting Which Bugs Get Fixed: An Empirical Study of Microsoft Windows Philip J. Guo* Thomas Zimmermann+ Nachiappan Nagappan+ Brendan Murphy+ * Stanford University Microsoft Research

Add to Reading List

Source URL: www.pgbovine.net

Language: English - Date: 2014-01-03 23:24:44
969Debugging / OpenOffice.org / Bug / Windows Vista / Software / Software bugs / Bug tracking system

Microsoft Word - pr275-guo.docx

Add to Reading List

Source URL: www.pgbovine.net

Language: English - Date: 2014-01-03 23:24:44
970Computer security / Vulnerability / Bug / Cyberwarfare / Fuzz testing / Debugging / Software testing / Software quality / Software bugs

Build it, Break it A new security contest

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-17 11:48:18
UPDATE