Stack Overflow

Results: 257



#Item
101Memory management / Computer errors / Software bugs / Computer memory / Buffer overflow protection / Segmentation fault / Buffer overflow / Call stack / GNU Debugger / Computing / Computer programming / Software engineering

Guarded Memory Move (GMM) White Paper VERSION 0.5 Guarded Memory Move (GMM) Buffer Overflow Detection And Analysis Davide Libenzi

Add to Reading List

Source URL: xmailserver.org

Language: English - Date: 2007-02-16 03:03:26
102Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
103Software bugs / Memory management / Software testing / Control flow / Daikon / Exception handling / Invariant / Buffer overflow / Call stack / Computing / Software engineering / Computer programming

Automatically Patching Errors in Deployed Software Jeff H. Perkinsα , Sunghun Kimβ , Sam Larsenγ , Saman Amarasingheα , Jonathan Bachrachα , Michael Carbinα , Carlos Pachecoδ , Frank Sherwood, Stelios Sidiroglouα

Add to Reading List

Source URL: www.cse.ust.hk

Language: English - Date: 2012-06-14 09:36:59
104Software engineering / Buffer overflow / Stack buffer overflow / PaX / Address space layout randomization / Vulnerability / Memory safety / Pointer / Uncontrolled format string / Computing / Software bugs / Computer security

Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers ∗ Zhenkai Liang and R. Sekar Dept. of Computer Science, Stony Brook University

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2009-08-03 23:33:34
105Software bugs / Computer errors / Memory management / Stack overflow / Stack / Call stack / ThreadX / Subroutine / C dynamic memory allocation / Computing / Software engineering / Computer programming

Helping you avoid stack overflow crashes! One of the toughest (and unfortunately common) problems in embedded systems is stack overflows and the collateral corruption that it can cause. As a result, we have spent consid

Add to Reading List

Source URL: rtos.com

Language: English - Date: 2010-11-12 18:36:33
106Computer programming / Pointer / Dangling pointer / Stack buffer overflow / Memory safety / Address space layout randomization / Buffer overflow / C / Memory corruption / Computing / Software engineering / Software bugs

SoK: Eternal War in Memory L´aszl´o Szekeres† , Mathias Payer‡ , Tao Wei∗‡ , Dawn Song‡ † Stony Brook University ‡ University of California, Berkeley ∗ Peking University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:27
107Software engineering / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Stack / C standard library / Setjmp.h / Denial-of-service attack / Write / Software bugs / Computing / Software quality

Design of a secure system Software Security Holes and Defenses u Follows a ring design.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-14 14:43:28
108Applied mathematics / Computational biology / Community websites / Mathematical and theoretical biology / Stack Overflow / Galaxy / EMBnet / Bioinformatics / Science / Biology

Perspective BioStar: An Online Question & Answer Resource for the Bioinformatics Community Laurence D. Parnell1, Pierre Lindenbaum2, Khader Shameer3, Giovanni Marco Dall’Olio4, Daniel C. Swan5, Lars Juhl Jensen6, Simo

Add to Reading List

Source URL: www.directeffectmedia.com

Language: English - Date: 2015-04-09 18:06:04
109Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu [removed] [removed]

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
UPDATE