نتایج جستجو برای: buffer

تعداد نتایج: 42910  

2011
Elmar Eisemann Sylvain Lefebvre

Acknowledgements I would like to thank Sylvain Lefebvre for his help concerning the pBuffers and 3DSLib and other OpenGL questions. I would like to thank Gilles Debunne for libQGLViewer. Probably one of the most useful libraries available. I would like to thank Samuel Hornus for his comments and proof reading and Martin Eisemann for all his comments as well as Stephan Camerer for all the discus...

Journal: :JSW 2014
Chunguang Kuang Chunlei Wang Minhuan Huang

-Since the first buffer overflow problem occurred, many detection techniques have been presented. These techniques are effective in detecting most attacks, but some attacks still remain undetected. In order to be more effective, a memory-size-assisted buffer overflow detection(MBOD) is presented. The key feature of buffer overflow is that the size of the source memory is bigger than the size of...

2001
David Larochelle David Evans

Buffer overflow attacks may be today’s single most important security threat. This paper presents a new approach to mitigating buffer overflow vulnerabilities by detecting likely vulnerabilities through an analysis of the program source code. Our approach exploits information provided in semantic comments and uses lightweight and efficient static analyses. This paper describes an implementation...

Journal: :CoRR 2014
Rakesh Gupta

This paper describes a CMOS analogy voltage supper buffer designed to have extremely low static current Consumption as well as high current drive capability. A new technique is used to reduce the leakage power of class-AB CMOS buffer circuits without affecting dynamic power dissipation. The name of applied technique is TRANSISTOR GATING TECHNIQUE, which gives the high speed buffer with the redu...

1994
J. Bradley Chen

We used memory reference traces from a DEC Ultrix system running the X11 window system from MIT Project Athena and several freely available X11 applications to measure different aspects of memory system behavior and performance. Our measurements show that memory behavior for X11 workloads differs in several important ways from workloads more traditionally used in cache performance studies. User...

2013
Jussi Mäki

Buffer overflows still remain a problem for software today. Even with address space randomization and non-executable stacks software remains vulnerable to clever exploits. In this paper we introduce the buffer overflow through a pratical example and take a retrospective look on the past 25 years of the arms race on buffer overflow exploits and protections.

2003
Victor M. DeLaLuz Mahmut T. Kandemir Anand Sivasubramaniam Mary Jane Irwin Narayanan Vijaykrishnan

Translation Look-aside Buffer (TLB), which is small Content Addressable Memory (CAM) structure used to translate virtual addresses to physical addresses, can consume significant energy in some architectures. In addition, its power density is high, due to its small area. Consequently, reducing power consumption of TLB is important for both high-end and low-end systems. While a large TLB might be...

Journal: :Management Science 2006
Martine R. Haas

Knowledge gathering can create problems as well as benefits for project teams in work environments characterized by overload, ambiguity, and politics. This paper proposes that the value of knowledge gathering in such environments is greater under conditions that enhance team processing, sensemaking, and buffering capabilities. The hypotheses were tested using independent quality ratings of 96 p...

2008
D. Wu Y. Fan M. Zhao Y. Zhang

A novel transition structure based on Substrate Integrated Circular Cavity (SICC) is proposed in this paper. The design approach of the transition structure can also be used in other operating frequency. Good performance of flexibility and S-parameters were observed for the new transition structure. Different design tools were used to validate the design method.

2003
Eric Rescorla

We report on an observational study of user response following the OpenSSL remote buffer overflows of July 2002 and the worm that exploited it in September 2002. Immediately after the publication of the bug and its subsequent fix we identified a set of vulnerable servers. In the weeks that followed we regularly probed each server to determine whether its administrator had applied one of the rel...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید