نتایج جستجو برای: overflow distribution
تعداد نتایج: 614641 فیلتر نتایج به سال:
Introduction Conclusions References
ÐHigh-speed multiplication is frequently used in general-purpose and application-specific computer systems. These systems often support integer multiplication, where two n-bit integers are multiplied to produce a 2n-bit product. To prevent growth in word length, processors typically return the n least significant bits of the product and a flag that indicates whether or not overflow has occurred...
In this paper, the performance of ATM switches with self-similar input traffic is analyzed. The ATM switch is a non-blocking, output-buffered switch, and input traffic is approximated by a Poisson-Zeta process, which is an asymptotically second-order self-similar process. The upper and lower bounds of the buffer overflow probability of the switch are obtained by stochastically bounding the numb...
Programs written in C are inherently vulnerable to buffer overflow attacks. Functions are frequently passed pointers as parameters without any hint of their sizes. Since their sizes are unknown, most run time buffer overflow detection techniques instead rely on signatures of known attacks or loosely estimate the range of the referenced buffers. Although they are effective in detecting most atta...
Buffer overflow attacks cause serious security problems. Array & pointer bound checking is one of the most effective approaches for defending against buffer overflow attacks when source code is available. However, original array & pointer bound checking causes too much overhead since it is designed to catch memory errors and it puts too many checks. In this paper, we propose an efficient array ...
Annexe A – Exercices sur les buffer overflows 90 Annexe B – Les codes utilisés dans le rapport-4/92
Buffer overflow attacks may be today’s single most important security threat. This paper presents a new approach to mitigating buffer overflow vulnerabilities by detecting likely vulnerabilities through an analysis of the program source code. Our approach exploits information provided in semantic comments and uses lightweight and efficient static analyses. This paper describes an implementation...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید