Search

Your search keyword '"Buffer overflow"' showing total 2,219 results

Search Constraints

Start Over You searched for: Descriptor "Buffer overflow" Remove constraint Descriptor: "Buffer overflow"
2,219 results on '"Buffer overflow"'

Search Results

1. Alleviating Security Deficiencies In C++ Code.

2. Efficient Routing in MANETs by Optimizing Packet Loss.

3. Association Rules for Buffer Overflow Vulnerability Detection Using Machine Learning

4. [Solution] Algorithmic Heap Layout Manipulation in the Linux Kernel

6. A buffer overflow detection and defense method based on RISC-V instruction set extension

7. Stack-Based Buffer Overflow Implementation Using Python 3

8. Adobe Photoshop Vulnerabilities

9. A buffer overflow detection and defense method based on RISC-V instruction set extension.

10. Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow †.

11. Use of Ensemble Learning to Detect Buffer Overflow Exploitation

13. Review of Stack-Based Binary Exploitation Techniques

15. Testing for IT Security: A Guided Search Pattern for Exploitable Vulnerability Classes

17. DTN Architecture With Resource-Aware Rate Adaptation for Multiple Bundle Transmission in InterPlanetary Networks

21. Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow

22. ASLR: How Robust is the Randomness?

23. Evaluating error when estimating the loss probability in a packet buffer

24. Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection.

25. Comparative Evaluation of Security Fuzzing Approaches

26. Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects

27. Inter-Process CFI for Peer/Reciprocal Monitoring in RISC-V-Based Binaries.

28. Optimized data gathering in a heterogeneous Internet of Things network.

29. ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors

30. Cooperative mobile data collection in smart cities

31. Time to Buffer Overflow in a Queueing Model with Working Vacation Policy

32. Buffer Overflow and SQL Injection: To Remotely Attack and Access Information

33. Constraint-Based Testing for Buffer Overflows

34. SSRC:source rate control algorithm for delay-sensitive flow in data center network

35. Buffer Overflow Duration in a Model of WSN Node with Power Saving Mechanism Based on SV Policy

36. SIMBER: Eliminating Redundant Memory Bound Checks via Statistical Inference

39. Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming

40. SafeStack: Enhanced Dual Stack to Combat Data-Flow Hijacking

41. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks

42. Hardware Assisted Buffer Protection Mechanisms for Embedded RISC-V.

43. On time-to-buffer overflow distribution in a single-machine discrete-time system with finite capacity

44. A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device

45. Automatic Buffer Overflow Warning Validation.

46. On Time-to-Buffer Overflow Distribution in a Single-Machine Discrete-Time System with Finite Capacity.

47. Distribution of the time to buffer overflow in the M/G/1/N-type queueing model with batch arrivals and multiple vacation policy.

48. Collecting Vulnerable Source Code from Open-Source Repositories for Dataset Generation.

50. Analysis of Transient Virtual Delay in a Finite-Buffer Queueing Model with Generally Distributed Setup Times

Catalog

Books, media, physical & digital resources