Taint

Results: 199



#Item
51Oenology / Viticulture / Phenolic content in wine / Ripeness in viticulture / Annual growth cycle of grapevines / Grape / Veraison / Health effects of wine / Fermentation / Wine / Food and drink / Biotechnology

Microsoft Word - Smoke Taint Fact Sheet.doc

Add to Reading List

Source URL: research.agwa.net.au

Language: English - Date: 2014-06-30 18:05:18
52Abstract data types / Cross-platform software / Procedural programming languages / Static program analysis / Program slicing / Software maintenance / Priority queue / Pointer / C / Computing / Software engineering / Programming language theory

TAJ: Effective Taint Analysis of Web Applications Omer Tripp IBM Software Group Marco Pistoia

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2010-09-02 06:19:16
53Perl / Character encoding / Cross-platform software / Plain Old Documentation / UTF-8 / Taint checking / Regular expression / Unicode / Computing / Software engineering / Computer programming

Perl versiondocumentation - perl587delta NAME perl587delta - what is new for perl v5.8.7 DESCRIPTION

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 15:58:30
54Biology / Boar taint / Castration / Medicine / Pig farming / Androstenone / Meat / Domestic pig / Wild boar / Andrology / Zoology / Pigs

summary The present report, requested by the Danish Ministry of Food, Agriculture and Fisheries, summarizes the current knowledge on alternatives to surgical castration based on the scientific literature supplemented wit

Add to Reading List

Source URL: pure.au.dk

Language: English - Date: 2015-02-01 06:09:00
55Containers / Oenology / Wine on Tap / Keg / Packaging / Barrel / Bottle variation / Cork taint / Aging of wine / Wine / Biotechnology / Technology

ABOUT WINE ON TAP An exciting new wine category is rapidly exploding in marquee North American cities. Wine-on-tap offers the evolution of wine-by-the glass pours. Wine-on-tap is dispensed from stainless steel kegs and

Add to Reading List

Source URL: tapandbarrel.com

Language: English - Date: 2014-10-02 14:51:55
56Fortify Software / Software quality / Vulnerability / Software testing / Computer security / Cyberwarfare

Dynamic Taint Propagation Finding Vulnerabilities Without Attacking Brian Chess / Jacob West Fortify Software

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:23
57Dataflow / Symbolic execution / Algorithm / Information flow / Dependence analysis / Pointer / Information / Taint checking / Computing / Software engineering / Parallel computing

DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation Min Gyung Kang∗† Stephen McCamant† Pongsin Poosankam∗† Dawn Song† † UC Berkeley ∗ Carnegie Mellon University {mgkang,ppoosank}@cmu.edu

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
58Software testing / Error detection and correction / Fuzz testing / Checksum / Cksum / Sum / Adler-32 / Hash function / Transmission Control Protocol / Computing / Software / System software

15 Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution TIELEI WANG and TAO WEI, Peking University GUOFEI GU, Texas A&M University WEI ZOU, Peking University

Add to Reading List

Source URL: lenx.100871.net

Language: English
59Cyberwarfare / Stack buffer overflow / Buffer overflow / Uncontrolled format string / Vulnerability / Valgrind / C / Malware / Pointer / Computing / Software bugs / Software engineering

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Carnegie Mellon University Abstract

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
60Computer security / Buffer overflow / Vulnerability / Valgrind / Uncontrolled format string / Intrusion detection system / Cyberwarfare / Software bugs / Computing

Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software James Newsome Dawn Song May 2004

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
UPDATE