نتایج جستجو برای: code injection

تعداد نتایج: 323507  

2007
Todd A. DeLong Anup K. Ghosh Barry W. Johnson Joseph A. Profeta

Fault injection provides a method of assessing the dependability of a system under test. Traditionally fault injection is employed near the end of the design process after hardware and software prototypes have been developed. In order to eliminate costly re-designs near the end of the design process, a methodology for performing fault injection throughout the design process is described in this...

Journal: :CoRR 2017
Claude Carlet Sihem Mesnager Chunming Tang Yanfeng Qi

Linear codes with complementary duals (abbreviated LCD) are linear codes whose intersection with their dual is trivial. When they are binary, they play an important role in armoring implementations against side-channel attacks and fault injection attacks. Non-binary LCD codes in characteristic 2 can be transformed into binary LCD codes by expansion. On the other hand, being optimal codes, maxim...

1998
Anup K. Ghosh Tom O'Connor

This paper presents an approach for analyzing security-critical software for vulnerability to bu er overrun attacks. In practice, bu er overruns are a commonly exploited attack against security-critical software systems. Bu er overrun attacks are made possible by aws in designing and implementing software. This paper describes a software analysis tool that dynamically analyzes software source c...

Journal: :Comput. J. 2010
Thanassis Giannetsos Tassos Dimitriou Ioannis Krontiris Neeli R. Prasad

Malicious code (or malware) is defined as software designed to execute attacks on software systems and fulfill the harmful intents of an attacker. As lightweight embedded devices become more ubiquitous and increasingly networked, they present a new and very disturbing target for malware developers. In this paper, we demonstrate how to execute malware on wireless sensor nodes that are based on t...

Journal: :Facta universitatis. Series electronics and energetics 2022

Ultra-Wideband Direct Sequences Code Division Multiple Access (DS-DMA) plays an important role in the case of multi-terminal multi-application communications UWB devices. In systems that exploit injection pulse itself directly to antenna hence very wide bandwidth, generation suitable DS-CDMA codes poses a real challenge. this paper we will describe our novel transmission which uses pseudo-ortho...

Journal: :journal of structural engineering and geo-techniques 2011
kiarash nasserasadi

in this paper, efforts are made to compare the safety of steel moment resistant frames designed according to different editions of the iranian code of practice for seismic resistant design of buildings. also, failure risk of a low and medium height frame which designed for high and low seismicity regions according to three editions of the code are evaluated. first, the testing cases were design...

Journal: :iranian journal of science and technology (sciences) 2009
m. haji-shafeieha

beryllium chemical combination has a considerable effect on the design and fabrication of the241am9be neutron source. in this investigation the beryllium combinations were studied as a generator ofneutrons with various mass percentage, and the neutron yields were also calculated using the results of thealice and srim codes calculations per unit incident charge. the neutron yields of beryllium ...

2011
Ping Chen Yi Fang Bing Mao Li Xie

JIT spraying is a new code-reuse technique to attack virtual machines based on JIT (Just-in-time) compilation. It has proven to be capable of circumventing the defenses such as data execution prevention (DEP) and address space layout randomization(ASLR), which are effective for preventing the traditional code injection attacks. In this paper, we describe JITDefender, an enhancement of standard ...

2010
Vladan Djeric Ashvin Goel

Web browsers are increasingly designed to be extensible to keep up with the Web’s rapid pace of change. This extensibility is typically implemented using script-based extensions. Script extensions have access to sensitive browser APIs and content from untrusted web pages. Unfortunately, this powerful combination creates the threat of privilege escalation attacks that grant web page scripts the ...

2010
Prateek Saxena David Molnar Benjamin Livshits

The primary defense against cross site scripting attacks in web applications is the use of sanitization, the practice of filtering untrusted inputs. We analyze sanitizer use in a shipping web application with over 400,00 lines of code, one of the largest applications studied to date. Our analysis reveals two novel problems: inconsistent sanitization and inconsistent multiple sanitization. We fo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید