Stack Overflow

Results: 257



#Item
121Software bugs / Buffer overflow / Heap overflow / Address space layout randomization / Call stack / C dynamic memory allocation / Stack machine / Pointer / Memory corruption / Computing / Software engineering / Computer programming

Secure 64 SourceT OS Security Evaluation Report Matasano Security, LLC November 20, 2007

Add to Reading List

Source URL: www.secure64.com

Language: English - Date: 2009-10-09 13:10:06
122Software bugs / Buffer overflow / Circular buffer / C / Stack buffer overflow / Defensive programming / Computing / Software engineering / Computer programming

Exception Handling Exception handling can help ameliorate the problem of indexing arrays outside their bounds. It allows the programmer to control what happens when an input string is too long. Exception handling is a

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:20:45
123Computer programming / Cross-platform software / Buffer overflow / Circular buffer / C / Stack buffer overflow / Computing / Software bugs / Software engineering

Exception Handling Exception handling can help ameliorate the problem of indexing arrays outside their bounds. It allows the programmer to control what happens when an input string is too long. Exception handling is a co

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:20:47
124Cyberwarfare / Buffer overflow / Stack buffer overflow / Vulnerability / Stack overflow / Splint / Attack / Computer virus / Stack / Software bugs / Computing / Software quality

2-4 Buffer-Overflow Detection in C Program by Static Detection NAKAMURA Goichi, MAKINO Kyoko, and MURASE Ichiro Buffer_overflow is the most dangerous vulnerability implicit in C programs. whether a Buffer_oveflow emerges

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:56:01
125Software bugs / Internet standards / Units of information / Denial-of-service attacks / SQL Slammer / Computer network security / Witty / Stack buffer overflow / User Datagram Protocol / Computing / Network architecture / Internet

VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS 2 CHIBA WITTY BLUES Peter Ferrie, Frédéric Perriot, Péter Ször Symantec, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
126Software bugs / Compilers / GNU Compiler Collection / Microcontrollers / Computer errors / Embedded microprocessors / V850 / Stack overflow / LEON / Software / Computing / Computer programming

StackAnalyzer – Stack Usage Analysis Stack overflow is now a thing of the past. StackAnalyzer automatically determines the worst-case stack usage of the tasks in your application. Stack usage contributions per function

Add to Reading List

Source URL: www.absint.com

Language: English - Date: 2014-11-14 06:34:31
127Computer programming / Buffer overflow / String / C / Stack buffer overflow / Buffer overflow protection / Computing / Software bugs / Software engineering

Programmers’ and Code Inspectors’ Checklist: Is every array index and pointer arithmetic operation… Okay given the preconditions and data assumptions?

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:20:11
128Computing / Software bugs / Sasser / Welchia / Blaster / Buffer overflow / Stack buffer overflow / Agobot / Windows / System software / Software / Computer worms

VIRUS BULLETIN www.virusbtn.com VIRUS ANALYSIS 2 MOSTL Y HARMLESS MOSTLY

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:43:27
129Computer programming / Programming language implementation / C++ / Pointer / C / Undefined behavior / Integer overflow / Stack / Uninitialized variable / Software engineering / Computing / Software bugs

A Differential Approach to Undefined Behavior Detection by Xi Wang B.E., Computer Science (2005); M.E., Computer Science[removed]Tsinghua University

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2015-04-12 14:06:01
130Cyberwarfare / Stack buffer overflow / Buffer overflow / Uncontrolled format string / Vulnerability / Valgrind / C / Malware / Pointer / Computing / Software bugs / Software engineering

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome [removed] Carnegie Mellon University Abstract

Add to Reading List

Source URL: www.valgrind.org

Language: English - Date: 2006-08-12 00:33:35
UPDATE