نتایج جستجو برای: overflow detection
تعداد نتایج: 572254 فیلتر نتایج به سال:
Repeated modular additions and overflow detection are possible in redundant hybrid number systems (RHNS). In this paper a circuit is proposed that implements the overflow-detecting procedure in such systems and allows a mean addition time of about 10.5 gate delays for numbers having a magnitude order normally distributed in the range [−233, 233 − 1], versus a 14 gate delay required by 32-bit CL...
Software model checking based on abstraction-refinement has recently achieved widespread success in verifying API conformance in device drivers, and we believe this success can be replicated for the problem of buffer overflow detection. This paper presents a publicly-available benchmark suite to help guide and evaluate this research. The benchmark consists of 298 code fragments of varying compl...
Interpreter. Abstract interpretation [Cousot and Cousot 1977] is used in our flow as the main proof engine. While the focus of our effort is on finding bugs, proofs are valuable since they indicate the absence of a bug w.r.t our modeling assumptions. Furthermore, proofs of properties enable semantic slicing and simplication of the program, futher reducing its size and improving scalability. Our...
Buffer overflows are the source of a vast majority of vulnerabilities in today’s software. Existing solution for detecting buffer overflow, either statically or dynamically, have serious drawbacks that hinder their wider adoption by practitioners. In this paper we present an automated overflow detection technique based on model checking and iterative refinement. We discuss advantages, and limit...
In the trade-o s between security and performance, it seems that security is always the loser. If we allow for adaptive security, we can at least ensure that security and performance are treated somewhat equally. Using adaptive security, we can allow a system to exist in a less secure, more performant state until it comes under attack. We the adapt the system to a more secure, less performant i...
Since it is essentially impossible to write large-scale software without errors, any intrusion tolerant system must be able to tolerate rapid, repeated unknown attacks without exhausting its redundancy. Our system provides continued application services to critical users while under attack with a goal of less than 25% degradation of productivity. Initial experimental results are promising. It i...
Background and purpose: The current study is a systematic review about information overflow, that was conducted with the aim of identifying the status of researches conducted in this field, determining research gaps and the components and sub-components of interests, research methodology, and challenges and solutions related to the information overflow of studies. Materials and methods: A sys...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید