نتایج جستجو برای: code injection
تعداد نتایج: 323507 فیلتر نتایج به سال:
Fault injection provides a method of assessing the dependability of a system under test. Traditionally fault injection is employed near the end of the design process after hardware and software prototypes have been developed. In order to eliminate costly re-designs near the end of the design process, a methodology for performing fault injection throughout the design process is described in this...
Linear codes with complementary duals (abbreviated LCD) are linear codes whose intersection with their dual is trivial. When they are binary, they play an important role in armoring implementations against side-channel attacks and fault injection attacks. Non-binary LCD codes in characteristic 2 can be transformed into binary LCD codes by expansion. On the other hand, being optimal codes, maxim...
This paper presents an approach for analyzing security-critical software for vulnerability to bu er overrun attacks. In practice, bu er overruns are a commonly exploited attack against security-critical software systems. Bu er overrun attacks are made possible by aws in designing and implementing software. This paper describes a software analysis tool that dynamically analyzes software source c...
Malicious code (or malware) is defined as software designed to execute attacks on software systems and fulfill the harmful intents of an attacker. As lightweight embedded devices become more ubiquitous and increasingly networked, they present a new and very disturbing target for malware developers. In this paper, we demonstrate how to execute malware on wireless sensor nodes that are based on t...
Ultra-Wideband Direct Sequences Code Division Multiple Access (DS-DMA) plays an important role in the case of multi-terminal multi-application communications UWB devices. In systems that exploit injection pulse itself directly to antenna hence very wide bandwidth, generation suitable DS-CDMA codes poses a real challenge. this paper we will describe our novel transmission which uses pseudo-ortho...
in this paper, efforts are made to compare the safety of steel moment resistant frames designed according to different editions of the iranian code of practice for seismic resistant design of buildings. also, failure risk of a low and medium height frame which designed for high and low seismicity regions according to three editions of the code are evaluated. first, the testing cases were design...
beryllium chemical combination has a considerable effect on the design and fabrication of the241am9be neutron source. in this investigation the beryllium combinations were studied as a generator ofneutrons with various mass percentage, and the neutron yields were also calculated using the results of thealice and srim codes calculations per unit incident charge. the neutron yields of beryllium ...
JIT spraying is a new code-reuse technique to attack virtual machines based on JIT (Just-in-time) compilation. It has proven to be capable of circumventing the defenses such as data execution prevention (DEP) and address space layout randomization(ASLR), which are effective for preventing the traditional code injection attacks. In this paper, we describe JITDefender, an enhancement of standard ...
Web browsers are increasingly designed to be extensible to keep up with the Web’s rapid pace of change. This extensibility is typically implemented using script-based extensions. Script extensions have access to sensitive browser APIs and content from untrusted web pages. Unfortunately, this powerful combination creates the threat of privilege escalation attacks that grant web page scripts the ...
The primary defense against cross site scripting attacks in web applications is the use of sanitization, the practice of filtering untrusted inputs. We analyze sanitizer use in a shipping web application with over 400,00 lines of code, one of the largest applications studied to date. Our analysis reveals two novel problems: inconsistent sanitization and inconsistent multiple sanitization. We fo...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید