نتایج جستجو برای: overflow detection

تعداد نتایج: 572254  

Journal: :Software: Practice and Experience 2003

2002
Thomas Toth Christopher Krügel

Static buffer overflow exploits belong to the most feared and frequently launched attacks on todays Internet. These exploits target vulnerabilities in daemon processes which provide important network services. Ever since the buffer overflow hacking technique has reached a broader audience due to the Morris Internet worm in 1988 and the infamous paper by AlephOne in the phrack magazine, new weak...

2014
Jun Cai Peng Zou Jun He Jinxin Ma

Fuzzing is one of the most commonly used methods to detect software vulnerabilities, a major cause of information security incidents. Although it has advantages of simple design and low error report, its efficiency is usually poor. In this paper we present a smart fuzzing approach for integer overflow detection and a tool, SwordFuzzer, which implements this approach. Unlike standard fuzzing tec...

Journal: :int. journal of mining & geo-engineering 2014
majid unesi mohammad noaparast sied ziaedin shafaei esmaeil jorjani

many studies have considered the effects of suspension properties on the dewatering process but fewhave focused on ore properties. thus, the present work studied the effects of ore properties (density,particle size, mineralogy) on the dewatering process based on lab and pilot experiments. a hydrocyclonewas used to prepare the required samples for the experiments. to study the effects of mineral...

1999
Ulf Lindqvist Phillip A. Porras

This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic signature-analysis engine for computer and network misuse detection. For more than a decade, earlier versions of P-BEST have been used in intrusion detection research and in the development of some of the most wellknow...

2003
Yu-Sung Wu Bingrui Foo Yongguo Mei Saurabh Bagchi

In this paper, we present the design and implementation of a Collaborative Intrusion Detection System (CIDS) for accurate and efficient intrusion detection in a distributed system. CIDS employs multiple specialized detectors at the different layers – network, kernel and application – and a manager based framework for aggregating the alarms from the different detectors to provide a combined alar...

Journal: :Proceedings of the Institute for System Programming of the RAS 2018

2009
Souvik Sarkar Anup Kumar Biswas Ankush Ghosh Subir Kumar Sarkar

Low power consumption, high operating speed and high integration density equipment(s) are financially indispensable in modern Electronics. Single Electron Device (SED) is one such equipment. Single Electron Devices are capable of controlling the transport of only an electron. A single electron is sufficient to store information in the SED. This paper presents the approach for designing multipli...

Journal: :Environmental science. Processes & impacts 2014
M Hajj-Mohamad K Aboulfadl H Darwano A-S Madoux-Humery H Guérineau S Sauvé M Prévost S Dorner

A sensitive method was developed to measure the sediment concentration of 10 wastewater micropollutants selected as potential sanitary tracers of sewage contamination and include: nonsteroidal anti-inflammatory drugs (acetaminophen - ACE and diclofenac - DIC), an anti-epileptic drug (carbamazepine - CBZ), a β-blocker (atenolol - ATL), a stimulant (caffeine - CAF), a bronchodilator (theophylline...

1998
Crispan Cowan

This paper presents a systematic solution to the persistent problem of buffer overflow attacks. Buffer overflow attacks gained notoriety in 1988 as part of the Morris Worm incident on the Internet. While it is fairly simple to fix individual buffer overflow vulnerabilities, buffer overflow attacks continue to this day. Hundreds of attacks have been discovered, and while most of the obvious vuln...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید