Search

Your search keyword '"buffer overflow"' showing total 2,226 results

Search Constraints

Start Over You searched for: Descriptor "buffer overflow" Remove constraint Descriptor: "buffer overflow"
2,226 results on '"buffer overflow"'

Search Results

1. Alleviating Security Deficiencies In C++ Code.

2. Efficient Routing in MANETs by Optimizing Packet Loss.

3. Association Rules for Buffer Overflow Vulnerability Detection Using Machine Learning

4. [Solution] Algorithmic Heap Layout Manipulation in the Linux Kernel

6. A buffer overflow detection and defense method based on RISC-V instruction set extension

7. Stack-Based Buffer Overflow Implementation Using Python 3

8. Adobe Photoshop Vulnerabilities

9. A buffer overflow detection and defense method based on RISC-V instruction set extension.

10. Use of Ensemble Learning to Detect Buffer Overflow Exploitation

11. Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow †.

13. Review of Stack-Based Binary Exploitation Techniques

15. Testing for IT Security: A Guided Search Pattern for Exploitable Vulnerability Classes

17. DTN Architecture With Resource-Aware Rate Adaptation for Multiple Bundle Transmission in InterPlanetary Networks

18. ASLR: How Robust is the Randomness?

19. Through the Window: Exploitation and Countermeasures of the ESP32 Register Window Overflow

23. Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects

24. Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection.

25. Evaluating error when estimating the loss probability in a packet buffer

26. Inter-Process CFI for Peer/Reciprocal Monitoring in RISC-V-Based Binaries.

27. Comparative Evaluation of Security Fuzzing Approaches

28. Optimized data gathering in a heterogeneous Internet of Things network.

29. Cooperative mobile data collection in smart cities

30. ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors

31. SSRC:source rate control algorithm for delay-sensitive flow in data center network

32. Time to Buffer Overflow in a Queueing Model with Working Vacation Policy

33. Buffer Overflow and SQL Injection: To Remotely Attack and Access Information

34. Constraint-Based Testing for Buffer Overflows

35. On time-to-buffer overflow distribution in a single-machine discrete-time system with finite capacity

36. Buffer Overflow Duration in a Model of WSN Node with Power Saving Mechanism Based on SV Policy

37. SIMBER: Eliminating Redundant Memory Bound Checks via Statistical Inference

40. Hiding Kernel Level Rootkits Using Buffer Overflow and Return Oriented Programming

41. SafeStack: Enhanced Dual Stack to Combat Data-Flow Hijacking

42. Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks

43. Hardware Assisted Buffer Protection Mechanisms for Embedded RISC-V.

44. Automatic Buffer Overflow Warning Validation.

45. On Time-to-Buffer Overflow Distribution in a Single-Machine Discrete-Time System with Finite Capacity.

46. Distribution of the time to buffer overflow in the M/G/1/N-type queueing model with batch arrivals and multiple vacation policy.

47. Collecting Vulnerable Source Code from Open-Source Repositories for Dataset Generation.

50. Analysis of Transient Virtual Delay in a Finite-Buffer Queueing Model with Generally Distributed Setup Times

Catalog

Books, media, physical & digital resources