نتایج جستجو برای: Overflow Detection

تعداد نتایج: 572254  

Journal: :journal of advances in computer engineering and technology 0
babak tavakoli islamic azad university, science and research branch mehdi hosseinzadeh islamic azad university, science and research branch somayeh jassbi islamic azad university, science and research branch

residue number system (rns) is a non-weighted number system for integer number arithmetic, which is based on the residues of a number to a certain set of numbers called module set. the main characteristics and advantage of residue number system is reducing carry propagation in calculations. the elimination of carry propagation leads to the possibility of maximizing parallel processing and reduc...

2005
Michael Zhivich Tim Leek Richard Lippmann

The capabilities of seven dynamic buffer overflow detection tools (Chaperon, Valgrind, CCured, CRED, Insure++, ProPolice and TinyCC) are evaluated in this paper. These tools employ different approaches to runtime buffer overflow detection and range from commercial products to opensource gcc-enhancements. A comprehensive testsuite was developed consisting of specifically-designed test cases and ...

Residue Number System (RNS) is a non-weighted number system for integer number arithmetic, which is based on the residues of a number to a certain set of numbers called module set. The main characteristics and advantage of residue number system is reducing carry propagation in calculations. The elimination of carry propagation leads to the possibility of maximizing parallel processing and reduc...

2014
H. Siewobr

In this paper, a novel scheme for detecting overflow in Residue Number System (RNS) is presented. A generalized scheme for RNS overflow detection is introduced, followed by a simplified Operands Examination Method for overflow detection for the moduli set . The proposed method detects overflow in RNS addition of two numbers without pre-computing their sum .Moreover, when compared with the best ...

Journal: :JSW 2014
Chunguang Kuang Chunlei Wang Minhuan Huang

-Since the first buffer overflow problem occurred, many detection techniques have been presented. These techniques are effective in detecting most attacks, but some attacks still remain undetected. In order to be more effective, a memory-size-assisted buffer overflow detection(MBOD) is presented. The key feature of buffer overflow is that the size of the source memory is bigger than the size of...

Journal: :IEEE Transactions on Computers 2006

2005
Kendra Kratkiewicz Richard Lippmann

A taxonomy that uses twenty-two attributes to characterize Cprogram overflows was used to construct 291 small C-program test cases that can be used to diagnostically determine the basic capabilities of static and dynamic analysis buffer overflow detection tools. Attributes in the taxonomy include the buffer location (e.g. stack, heap, data region, BSS, shared memory); scope difference between b...

2013
Sachin B. Jadhav Deepak Choudhary

MCAIDS-Machine Code Analysis Intrusion Detection System for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. With the increasing access of Internet,the Internet threat takes a form of attack, targetting individuals users to gain control over network and data. Buffer overlow is one of the most occuring security vulnerability in c...

Journal: :International Journal of Computer Applications 2014

2004
Stig Andersson Andrew Clark George Mohay

Buffer overflow attacks continue to be a major security problem and detecting attacks of this nature is therefore crucial to network security. Signature based network based intrusion detection systems (NIDS) compare network traffic to signatures modelling suspicious or attack traffic to detect network attacks. Since detection is based on pattern matching, a signature modelling the attack must e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید