咨询与建议

限定检索结果

文献类型

  • 7 篇 会议
  • 2 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 8 篇 计算机科学与技术...
    • 6 篇 软件工程
    • 5 篇 电气工程
    • 3 篇 控制科学与工程
  • 2 篇 管理学
    • 2 篇 管理科学与工程(可...

主题

  • 9 篇 heap overflow
  • 4 篇 stack overflow
  • 2 篇 reliability
  • 2 篇 data compression
  • 2 篇 heapdefender
  • 2 篇 embedded system
  • 2 篇 reuse
  • 2 篇 out-of-memory er...
  • 1 篇 vulnerability ri...
  • 1 篇 languages
  • 1 篇 run-time checks
  • 1 篇 privacy protecti...
  • 1 篇 placement new
  • 1 篇 embedded systems
  • 1 篇 attacks
  • 1 篇 exploitability v...
  • 1 篇 software rejuven...
  • 1 篇 cactus stack
  • 1 篇 resource constra...
  • 1 篇 symbolic executi...

机构

  • 1 篇 motorola india r...
  • 1 篇 department of el...
  • 1 篇 chinese acad sci...
  • 1 篇 purdue univ sch ...
  • 1 篇 motorola softwar...
  • 1 篇 ibm tj watson re...
  • 1 篇 motorola labs ba...
  • 1 篇 isfahan univ tec...
  • 1 篇 univ maryland de...
  • 1 篇 chinese acad sci...
  • 1 篇 chinese acad sci...
  • 1 篇 natl univ singap...
  • 1 篇 department of el...
  • 1 篇 purdue univ ceri...
  • 1 篇 huazhong univ sc...

作者

  • 2 篇 barua rajeev
  • 2 篇 middha bhuvan
  • 2 篇 simpson matthew
  • 1 篇 feng weimiao
  • 1 篇 baradaran sara
  • 1 篇 li dongfang
  • 1 篇 yang yi
  • 1 篇 bagchi saurabh
  • 1 篇 heidari mahdi
  • 1 篇 jia xiangkun
  • 1 篇 kintala chandra
  • 1 篇 kamali ali
  • 1 篇 cai yan
  • 1 篇 yan jia
  • 1 篇 li ying
  • 1 篇 liang zhenkai
  • 1 篇 homchaudhuri san...
  • 1 篇 bertino elisa
  • 1 篇 carley thomas
  • 1 篇 mouzarani maryam

语言

  • 9 篇 英文
检索条件"主题词=heap overflow"
9 条 记 录,以下是1-10 订阅
排序:
A Unit-Based Symbolic Execution Method for Detecting heap overflow Vulnerability in Executable Codes  16th
A Unit-Based Symbolic Execution Method for Detecting Heap Ov...
收藏 引用
16th International Conference on Tests and Proofs (TAP) held as part of the Federated Conference on Software Technologies - Applications and Foundations (STAF)
作者: Mouzarani, Maryam Kamali, Ali Baradaran, Sara Heidari, Mahdi Isfahan Univ Technol Dept Elect & Comp Engn Esfahan Iran
Symbolic execution has been a popular method for detecting vulnerabilities of programs in recent years, yet path explosion has remained a significant challenge in its application. This paper proposes a method for impr... 详细信息
来源: 评论
An Android System Vulnerability Risk Evaluation Method for heap overflow  4
An Android System Vulnerability Risk Evaluation Method for H...
收藏 引用
4th International Conference on Enterprise Systems (ES)
作者: Zhu, Dali Li, Ying Pang, Na Feng, Weimiao Chinese Acad Sci Inst Informat Engn Beijing Peoples R China
Android smart device has become a preferred target for attackers as it carries plenty of private and sensitive information. However, heap overflow vulnerability in Android system gives the opportunity to execute arbit... 详细信息
来源: 评论
Automatically Assessing Crashes from heap overflows  32
Automatically Assessing Crashes from Heap Overflows
收藏 引用
32nd IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: He, Liang Cai, Yan Hu, Hong Su, Purui Liang, Zhenkai Yang, Yi Huang, Huafeng Yan, Jia Jia, Xiangkun Feng, Dengguo Chinese Acad Sci Inst Software Trusted Comp & Informat Assurance Lab Beijing Peoples R China Chinese Acad Sci State Key Lab Comp Sci Inst Software Beijing Peoples R China Natl Univ Singapore Dept Comp Sci Singapore Singapore
heap overflow is one of the most widely exploited vulnerabilities, with a large number of heap overflow instances reported every year. It is important to decide whether a crash caused by heap overflow can be turned in... 详细信息
来源: 评论
heapDefender: A Mechanism of Defending Embedded Systems against heap overflow via Hardware
HeapDefender: A Mechanism of Defending Embedded Systems agai...
收藏 引用
IEEE 9th International Conference on Ubiquitous Intelligence and Computing (UIC) / IEEE 9th International Conference on Autonomic and Trusted Computing (ATC)
作者: Li, Dongfang Liu, Zhenglin Zhao, Yizhi Huazhong Univ Sci & Technol Dept Elect Sci & Technol Wuhan 430074 Hubei Peoples R China
Buffer overflow attacks have been causing serious security problems for decades. While numerous approaches have been proposed to prevent stack overflows, heap overflows remain a security threat and a frequent source o... 详细信息
来源: 评论
heapDefender: A Mechanism of Defending Embedded Systems against heap overflow via Hardware
HeapDefender: A Mechanism of Defending Embedded Systems agai...
收藏 引用
International Conference on Ubiquitous Intelligence & Computing
作者: Dongfang Li Zhenglin Liu Yizhi Zhao Department of electronic Science and Technology Huazhong University Of Science and Technology
Buffer overflow attacks have been causing serious security problems for decades. While numerous approaches have been proposed to prevent stack overflows, heap overflows remain a security threat and a frequent source o... 详细信息
来源: 评论
A New Class of Buffer overflow Attacks
A New Class of Buffer Overflow Attacks
收藏 引用
31st International Conference on Distributed Computing Systems (ICDCS)
作者: Kundu, Ashish Bertino, Elisa IBM TJ Watson Res Ctr Hawthorne NY USA Purdue Univ CERIAS W Lafayette IN 47907 USA
In this paper, we focus on a class of buffer overflow vulnerabilities that occur due to the "placement new" expression in C++. " Placement new" facilitates placement of an object/array at a specifi... 详细信息
来源: 评论
MTSS: Multitask stack sharing for embedded systems
收藏 引用
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS 2008年 第4期7卷 46-46页
作者: Middha, Bhuvan Simpson, Matthew Barua, Rajeev Univ Maryland Dept Elect & Comp Engn College Pk MD 20742 USA
Out-of-memory errors are a serious source of unreliability in most embedded systems. Applications run out of main memory because of the frequent difficulty of estimating the memory requirement before deployment, eithe... 详细信息
来源: 评论
Improving dependability using shared supplementary memory and opportunistic micro rejuvenation in multi-tasking embedded systems
Improving dependability using shared supplementary memory an...
收藏 引用
13th Pacific Rim International Symposium on Dependable Computing
作者: Sundaram, Vinaitheerthan HomChaudhuri, Sandip Garg, Sachin Kintala, Chandra Bagchi, Saurabh Purdue Univ Sch Elect & Comp Engn 465 Northwestern Ave W Lafayette IN 47907 USA Motorola Software Grp Bangalore 560093 Karnataka India Motorola Labs Bangalore 560093 Karnataka India Motorola India Res Labs Bangalore Karnataka India
We propose a comprehensive solution to handle memory-overflow problems in multitasking embedded systems thereby improving their reliability and availability. In particular, we propose two complementary techniques to a... 详细信息
来源: 评论
Memory overflow Protection for Embedded Systems Using Run-Time Checks, Reuse, and Compression
收藏 引用
ACM Transactions on Embedded Computing Systems 2006年 第4期5卷 719-752页
作者: Biswas, Surupa Carley, Thomas Simpson, Matthew Middha, Bhuvan Barua, Rajeev Department of Electrical and Computer Engineering University of Maryland College Park Maryland 20742 United States
Embedded systems usually lack virtual memory and are vulnerable to memory overflow since they lack a mechanism to detect overflow or use swap space thereafter. We present a method to detect memory overflows using comp... 详细信息
来源: 评论