نتایج جستجو برای: overflow detection

تعداد نتایج: 572254  

2003
Maheshkumar Sabhnani Gürsel Serpen

This paper proposes a heuristic rule for detection of user-to-root (U2R) attacks against Solaris TM operating system. Relevant features for developing heuristic rules were manually mined using Solaris TM Basic Security Module audit data. The proposed rule was tested on both DARPA 1998 and 1999 intrusion detection datasets. Results show that all user-to-root attacks exploiting the suid program w...

2017
Wei Emma Zhang Quan Z. Sheng Jey Han Lau Ermyas Abebe

Programming community-based question-answering (PCQA) websites such as Stack Overflow enable programmers to find working solutions to their questions. Despite detailed posting guidelines, duplicate questions that have been answered are frequently created. To tackle this problem, Stack Overflow provides a mechanism for reputable users to manually mark duplicate questions. This is a laborious eff...

Journal: :Proceedings of the Institute for System Programming of the RAS 2018

Journal: :Applied ergonomics 2013
Yu Zhang Elizabeth Harris Meghan Rogers David Kaber Joseph Hummer William Rasdorf Jia Hu

Driver distraction and safety concerns have been identified for new highway logo sign configurations. This study assessed driver perception of logo signs and distraction under nine-panel, overflow-combination, or standard six-panel formats. A nine-panel sign has nine business panels within a single sign; a six-panel sign has six panels within a sign; an overflow-combination consists of a standa...

1999
A. Schlögl P. Anderer M.-J. Barbanoj G. Klösch G. Gruber J. L. Lorenzo O. Filz M. Koivuluoma I. Rezek S. J. Roberts A. Värri P. Rappelsberger G. Pfurtscheller

Artefact processing is an important issue in automated analysis of the sleep EEG. Nine artefact types were identified and their frequency of occurrence was analysed in 15 all-night sleep recordings from eight European sleep laboratories. Three artefact detection methods were evaluated with the area-under-ROC-curve (AUC), eight artefact minimisation methods were validated visually. Recommended m...

1991
Jen-Shiun Chiang Mi Lu

We present in this paper a novel general algorithm for signed number division in Residue Number Systems (RNS). A parity checking technique is used to accomplish the sign and overflow detection in this algorithm. Compared with conventional methods of sign and overflow detection, the parity checking method is more e f ficient and practical. Sign magnitude arithmetic division is implemented using ...

2010
Yong Wang Dawu Gu Jianping Xu Mi Wen Liwen Deng

Integer overflow vulnerability will cause buffer overflow. The research on the relationship between them will help us to detect integer overflow vulnerability. We present a dynamic analysis methods RICB (Runtime Integer Checking via Buffer overflow). Our approach includes decompile execute file to assembly language; debug the execute file step into and step out; locate the overflow points and c...

2005
Periklis Akritidis Evangelos P. Markatos Michalis Polychronakis Kostas G. Anagnostakis

Despite considerable effort, buffer overflow attacks remain a major security threat today, especially when coupled with self-propagation mechanisms as in worms and viruses. This paper considers the problem of designing networklevel mechanisms for detecting polymorphic instances of such attacks. The starting point for our work is the observation that many buffer overflow attacks require a “sled”...

1999
Haining Wang Kang G. Shin

Random Early Detection (RED) was proposed as an active gateway queue-management mechanism. This paper proposes to alter the RED design guideline that unconditionally allows transient congestion, and evaluates its impacts. This unconditional allowance of transient congestion is shown to be harmful when the queue is near full, because it causes buffer overflow at a gateway. Buffer overflow at a g...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید