咨询与建议

限定检索结果

文献类型

  • 4 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 6 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 信息与通信工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 7 篇 buffer overflow ...
  • 1 篇 virtualized clou...
  • 1 篇 intrusion detect...
  • 1 篇 leak detection
  • 1 篇 secure heap memo...
  • 1 篇 program analysis
  • 1 篇 test data genera...
  • 1 篇 debugging
  • 1 篇 object code
  • 1 篇 use-after-free d...
  • 1 篇 satisfiability-m...
  • 1 篇 static analysis
  • 1 篇 unsafe function
  • 1 篇 intel spp
  • 1 篇 software quality
  • 1 篇 security
  • 1 篇 evolutionary tes...
  • 1 篇 testing
  • 1 篇 dynamic analysis
  • 1 篇 data-flow analys...

机构

  • 1 篇 nanjing univ inf...
  • 1 篇 chinese acad sci...
  • 1 篇 nanjing univ inf...
  • 1 篇 xinjiang univ sc...
  • 1 篇 grinnell coll de...
  • 1 篇 ecole polytech m...
  • 1 篇 univ massachuset...
  • 1 篇 univ sannio rcos...
  • 1 篇 ensta bretagne b...
  • 1 篇 mcgill univ mont...
  • 1 篇 fdn res & techno...
  • 1 篇 univ manchester ...
  • 1 篇 univ chinese aca...
  • 1 篇 toulouse inp tou...
  • 1 篇 univ texas san a...
  • 1 篇 univ rennes renn...
  • 1 篇 wuhan univ comp ...
  • 1 篇 nanjing univ inf...
  • 1 篇 grenoble inp gre...
  • 1 篇 college of compu...

作者

  • 1 篇 yang wenzhong
  • 1 篇 zhang yuantong
  • 1 篇 bromberg yerom-d...
  • 1 篇 liu tongping
  • 1 篇 wang wei
  • 1 篇 boukhobza jalil
  • 1 篇 zhou yong
  • 1 篇 tchana alain
  • 1 篇 shi gang
  • 1 篇 curtsinger charl...
  • 1 篇 merlo e.
  • 1 篇 ling yang
  • 1 篇 del grosso c.
  • 1 篇 akritidis p
  • 1 篇 chen liwei
  • 1 篇 markatos ep
  • 1 篇 berger emery d.
  • 1 篇 hagimont daniel
  • 1 篇 olivier pierre
  • 1 篇 galinier p.

语言

  • 7 篇 英文
检索条件"主题词=Buffer overflow detection"
7 条 记 录,以下是1-10 订阅
排序:
GuaNary: Efficient buffer overflow detection In Virtualized Clouds Using Intel EPT-based Sub-PageWrite Protection Support
收藏 引用
PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS 2023年 第3期7卷 1-26页
作者: Bitchebe, Stella Kone, Yves Olivier, Pierre Boukhobza, Jalil Bromberg, Yerom-David Hagimont, Daniel Tchana, Alain McGill Univ Montreal PQ Canada Toulouse INP Toulouse France Univ Manchester Manchester Lancs England ENSTA Bretagne Brest France Univ Rennes Rennes France Grenoble INP Grenoble France
Write buffer overflow is a widespread and prevalent memory safety violation in C/C++, reported as the top vulnerability in 2022 and 2023. Secure memory allocators are generally used to protect systems against attacks ... 详细信息
来源: 评论
An Effective buffer overflow detection With Super Data-Flow Graphs  20
An Effective Buffer Overflow Detection With Super Data-Flow ...
收藏 引用
20th IEEE Int Symposium on Parallel and Distributed Processing with Applicat / 15th IEEE Int Conf on Social Comp and Networking / 12th IEEE Int Conf on Big Data and Cloud Comp / 12th IEEE Int Conf on Sustainable Comp and Commun
作者: Zhang, Yuantong Chen, Liwei Nie, Xiaofan Shi, Gang Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
buffer overflow vulnerabilities have been a severe threat to computer systems in the past few decades. Therefore, several static approaches have been proposed for automatic vulnerability detection and fixing. Static a... 详细信息
来源: 评论
DOUBLETAKE: Fast and Precise Error detection via Evidence-Based Dynamic Analysis  16
DOUBLETAKE: Fast and Precise Error Detection via Evidence-Ba...
收藏 引用
38th IEEE/ACM International Conference on Software Engineering (ICSE)
作者: Liu, Tongping Curtsinger, Charlie Berger, Emery D. Univ Texas San Antonio Dept Comp Sci San Antonio TX 78249 USA Grinnell Coll Dept Comp Sci 1116 8th Ave Grinnell IA 50112 USA Univ Massachusetts Coll Informat & Comp Sci Amherst MA 01003 USA
Programs written in unsafe languages like C and C++ often suffer from errors like buffer overflows, dangling pointers, and memory leaks. Dynamic analysis tools like Valgrind can detect these errors, but their overhead... 详细信息
来源: 评论
A Method for Computer Software Security detection
A Method for Computer Software Security Detection
收藏 引用
7th International Conference on MEMS, NANO and Smart Systems (ICMENS 2011)
作者: Yong, Cheng Ling, Yang Jin Wenjia Yang Wenzhong Wang Wei Wang Feng Zhou Yong Nanjing Univ Informat Sci & Technol Jiangsu Technol & Engn Ctr Meteorol Sensor Networ Nanjing 210044 Jiangsu Peoples R China Nanjing Univ Informat Sci & Technol Beijing Coll Nanjing 210044 Jiangsu Peoples R China Nanjing Univ Informat Sci & Technol Coll Elect & Informat Engn Nanjing 210044 Jiangsu Peoples R China XinJiang Univ Sch Informat Sci & Engn Urumqi 830046 Xinjiang Peoples R China Wuhan Univ Comp Sch Wuhan 430072 Hubei Peoples R China
This paper proposed a method and a prototype using static analysis to detect security of computer software. There are many buffer overflow vulnerabilities in released software. It uses the static object code analysis ... 详细信息
来源: 评论
Detecting buffer overflow via automatic test input data generation
收藏 引用
COMPUTERS & OPERATIONS RESEARCH 2008年 第10期35卷 3125-3143页
作者: Del Grosso, C. Antoniol, G. Merlo, E. Galinier, P. Ecole Polytech Montreal Dept Genie Informat Montreal PQ H3T 1J4 Canada Univ Sannio RCOST Dept Engn I-82100 Benevento Italy
buffer overflows cause serious problems in various categories of software systems. In critical systems, such as health-care, nuclear or aerospace software applications, a buffer overflow may cause severe threats to hu... 详细信息
来源: 评论
An buffer overflow Automatic detection Method Based on Operation Semantic
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2005年 第3期12卷 63-66页
作者: ZHAO Dong-fan LIU Lei College of Computer Science and Technology Jilin University Changchun 130012 P.R. China
buffer overflow is the most dangerous attack method that can be exploited. According to the statistics of Computer Emergency Readiness Team ( CERT ), buffer overflow accounts for 50% of the current software vulnerab... 详细信息
来源: 评论
Stride: Polymorphic sled detection through instruction sequence analysis
Stride: Polymorphic sled detection through instruction seque...
收藏 引用
20th International Information Security Conference
作者: Akritidis, P Markatos, EP Polychronakis, M Anagnostakis, K Fdn Res & Technol Hellas Inst Comp Sci GR-71110 Iraklion Greece
Despite considerable effort, buffer overflow attacks remain a major security threat today, especially when coupled with self-propagation mechanisms as in worms and viruses. This paper considers the problem of designin... 详细信息
来源: 评论