نتایج جستجو برای: overflow

تعداد نتایج: 6760  

2012
Pankaj B. Pawar Malti Nagle Pankaj K. Kawadkar

Now a day internet threat takes a blended attack form, targeting individual users to gain control over networks and data. Buffer Overflow which is one of the most occurring security vulnerabilities in a Computer’s world. Buffer Overflow occurs while writing data to a buffer and it overruns the buffer's boundary and overwrites it to a adjacent memory. The techniques to exploit buffer overflow vu...

1998
Crispan Cowan

This paper presents a systematic solution to the persistent problem of buffer overflow attacks. Buffer overflow attacks gained notoriety in 1988 as part of the Morris Worm incident on the Internet. While it is fairly simple to fix individual buffer overflow vulnerabilities, buffer overflow attacks continue to this day. Hundreds of attacks have been discovered, and while most of the obvious vuln...

2005
Michael Zhivich Tim Leek Richard Lippmann

The capabilities of seven dynamic buffer overflow detection tools (Chaperon, Valgrind, CCured, CRED, Insure++, ProPolice and TinyCC) are evaluated in this paper. These tools employ different approaches to runtime buffer overflow detection and range from commercial products to opensource gcc-enhancements. A comprehensive testsuite was developed consisting of specifically-designed test cases and ...

2009
Jiayan Yang SHINICHIRO KIDA JIAYAN YANG JAMES F. PRICE

Marginal sea overflows and the overlying upper ocean are coupled in the vertical by two distinct mechanisms— by an interfacial mass flux from the upper ocean to the overflow layer that accompanies entrainment and by a divergent eddy flux associated with baroclinic instability. Because both mechanisms tend to be localized in space, the resulting upper ocean circulation can be characterized as a ...

Journal: :The European journal of neuroscience 2011
Tomoyuki Mitsumori Tomoyuki Furuyashiki Toshihiko Momiyama Akinori Nishi Takahide Shuto Takashi Hayakawa Fumitaka Ushikubi Shiho Kitaoka Tomohiro Aoki Haruhisa Inoue Toshiyuki Matsuoka Shuh Narumiya

The extracellular dopamine level is regulated not only by synaptic inputs to dopamine neurons but also by local mechanisms surrounding dopaminergic terminals. However, much remains to be investigated for the latter mechanism. Thromboxane A(2) is one of the cyclooxygenase products derived from arachidonic acid, and acts on its cognate G protein-coupled receptor [thromboxane receptor (TP)]. We sh...

2003
Christof Fetzer Zhen Xiao

HEALERS is a practical, high-performance toolkit that can enhance the robustness and security of existing applications. For any shared library, it can find all functions defined in that library and automatically derives properties for those functions. Through automated faultinjection experiments, it can detect arguments that cause the library to crash and derive safe argument types for each fun...

2017
Felix Fischer Konstantin Bottinger Huang Xiao Christian Stransky Yasemin Acar Michael Backes Sascha Fahl

Online programming discussion platforms such as Stack Overflow serve as a rich source of information for software developers. Available information include vibrant discussions and oftentimes ready-to-use code snippets. Previous research identified Stack Overflow as one of the most important information sources developers rely on. Anecdotes report that software developers copy and paste code sni...

Journal: :Circulation research 1984
A Schömig A M Dart R Dietz E Mayer W Kübler

The accumulation of endogenous catecholamines within the extracellular space of the ischemic myocardium has been studied in the isolated perfused (Langendorff) heart of the rat subjected to various periods of complete ischemia, with subsequent collection of the reperfusate. Catecholamines and deaminated metabolites were measured by radioenzymatic methods, or high pressure liquid chromatography....

Journal: :American journal of physiology. Heart and circulatory physiology 2008
Mirnela Byku Heather Macarthur Thomas C Westfall

The sympathetic nervous system and renin-angiotensin system are both thought to contribute to the development and maintenance of hypertension in experimental models such as the spontaneously hypertensive rat (SHR). We demonstrated that periarterial nerve stimulation (NS) increased the perfusion pressure (PP) and neuropeptide Y (NPY) overflow from perfused mesenteric arterial beds of SHRs at 4-6...

2004
Stig Andersson Andrew Clark George Mohay

Buffer overflow attacks continue to be a major security problem and detecting attacks of this nature is therefore crucial to network security. Signature based network based intrusion detection systems (NIDS) compare network traffic to signatures modelling suspicious or attack traffic to detect network attacks. Since detection is based on pattern matching, a signature modelling the attack must e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید