نتایج جستجو برای: overflow detection

تعداد نتایج: 572254  

Journal: :Comput. J. 1998
Giuseppe Alia Enrico Martinelli

Repeated modular additions and overflow detection are possible in redundant hybrid number systems (RHNS). In this paper a circuit is proposed that implements the overflow-detecting procedure in such systems and allows a mean addition time of about 10.5 gate delays for numbers having a magnitude order normally distributed in the range [−233, 233 − 1], versus a 14 gate delay required by 32-bit CL...

2007
Kelvin Ku Thomas E. Hart Marsha Chechik David Lie

Software model checking based on abstraction-refinement has recently achieved widespread success in verifying API conformance in device drivers, and we believe this success can be replicated for the problem of buffer overflow detection. This paper presents a publicly-available benchmark suite to help guide and evaluate this research. The benchmark consists of 298 code fragments of varying compl...

2008
Franjo Ivančić Sriram Sankaranarayanan Aarti Gupta Ilya Shlyakhter

Interpreter. Abstract interpretation [Cousot and Cousot 1977] is used in our flow as the main proof engine. While the focus of our effort is on finding bugs, proofs are valuable since they indicate the absence of a bug w.r.t our modeling assumptions. Furthermore, proofs of properties enable semantic slicing and simplication of the program, futher reducing its size and improving scalability. Our...

2005
Sagar Chaki Scott Hissam

Buffer overflows are the source of a vast majority of vulnerabilities in today’s software. Existing solution for detecting buffer overflow, either statically or dynamically, have serious drawbacks that hinder their wider adoption by practitioners. In this paper we present an automated overflow detection technique based on model checking and iterative refinement. We discuss advantages, and limit...

1999
Heather M. Hinton Crispin Cowan Lois M. L. Delcambre Shawn Bowers

In the trade-o s between security and performance, it seems that security is always the loser. If we allow for adaptive security, we can at least ensure that security and performance are treated somewhat equally. Using adaptive security, we can allow a system to exist in a less secure, more performant state until it comes under attack. We the adapt the system to a more secure, less performant i...

Journal: :Journal of Computer Science and Technology 2015

2002
James E. Just James C. Reynolds Larry A. Clough Melissa Danforth Karl N. Levitt Ryan Maglich Jeff Rowe

Since it is essentially impossible to write large-scale software without errors, any intrusion tolerant system must be able to tolerate rapid, repeated unknown attacks without exhausting its redundancy. Our system provides continued application services to critical users while under attack with a goal of less than 25% degradation of productivity. Initial experimental results are promising. It i...

Journal: :International Journal of Engineering, Science and Technology 2010

 Background and purpose: The current study is a systematic review about information overflow, that was conducted with the aim of identifying the status of researches conducted in this field, determining research gaps and the components and sub-components of interests, research methodology, and challenges and solutions related to the information overflow of studies. Materials and methods: A sys...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید