咨询与建议

限定检索结果

文献类型

  • 24 篇 会议
  • 12 篇 期刊文献
  • 5 册 图书
  • 1 篇 学位论文

馆藏范围

  • 42 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 35 篇 工学
    • 24 篇 计算机科学与技术...
    • 16 篇 软件工程
    • 8 篇 电气工程
    • 4 篇 信息与通信工程
    • 4 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 交通运输工程
    • 1 篇 航空宇航科学与技...
    • 1 篇 安全科学与工程
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...

主题

  • 42 篇 integer overflow
  • 6 篇 static analysis
  • 6 篇 buffer overflow
  • 5 篇 instruction
  • 4 篇 software vulnera...
  • 4 篇 mode
  • 3 篇 instructions
  • 3 篇 integer
  • 3 篇 trap
  • 3 篇 operand
  • 3 篇 software securit...
  • 3 篇 software reliabi...
  • 3 篇 symbolic executi...
  • 3 篇 machine learning
  • 2 篇 address
  • 2 篇 tools
  • 2 篇 operand specifie...
  • 2 篇 memory reference
  • 2 篇 decimal string
  • 2 篇 stack

机构

  • 2 篇 univ missouri co...
  • 2 篇 univ baltimore s...
  • 2 篇 korea univ sch c...
  • 1 篇 auburn universit...
  • 1 篇 shan
  • 1 篇 univ fed minas g...
  • 1 篇 东南大学
  • 1 篇 renmin univ chin...
  • 1 篇 tsinghua univ de...
  • 1 篇 univ illinois ur...
  • 1 篇 nanjing univ sta...
  • 1 篇 南京大学
  • 1 篇 peter great st p...
  • 1 篇 hai university o...
  • 1 篇 microsoft res re...
  • 1 篇 simula res lab o...
  • 1 篇 univ sci & techn...
  • 1 篇 univ calif davis...
  • 1 篇 univ calif santa...
  • 1 篇 concordia univ c...

作者

  • 2 篇 lee hyuk
  • 2 篇 raina sagar
  • 2 篇 long fan
  • 2 篇 demidov roman
  • 2 篇 sun hao
  • 2 篇 choi hong jun
  • 2 篇 sidiroglou-dousk...
  • 2 篇 taylor blair
  • 2 篇 kim deokhwan
  • 2 篇 pechenkin alexan...
  • 2 篇 luo yu
  • 2 篇 huang zhen
  • 2 篇 choi jin-young
  • 2 篇 kaza siddharth
  • 2 篇 rinard martin
  • 2 篇 xu dianxiang
  • 2 篇 xu weifeng
  • 1 篇 seladji yassamin...
  • 1 篇 gu dawu
  • 1 篇 quintao pereira ...

语言

  • 40 篇 英文
  • 2 篇 中文
检索条件"主题词=integer overflow"
42 条 记 录,以下是21-30 订阅
排序:
Study of Analyzing and Mitigating Vulnerabilities in uC/OS Real-Time Operating System  10
Study of Analyzing and Mitigating Vulnerabilities in uC/OS R...
收藏 引用
10th International Conference on Ubiquitous and Future Networks (ICUFN)
作者: Lee, Myeonggeon Choi, Gwangjun Park, Junsang Cho, Seong-je Dankook Univ Dept Comp Sci & Engn Gyeonggi Do 16890 South Korea
Programmable Logic Controllers (PLCs) have been widely used in real-time and embedded control applications including safety-critical control systems. Due to their ubiquity and network connectivity, PLCs are prone to v... 详细信息
来源: 评论
Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection  18
Applying Deep Learning and Vector Representation for Softwar...
收藏 引用
11th International Conference on Security of Information and Networks (SIN)
作者: Pechenkin, Alexander Demidov, Roman Peter Great St Petersburg Polytech Univ 29 Politekhn Skaya St St Petersburg Russia
This paper(1) addresses a problem of vulnerability detection in software represented as assembly code. An extended approach to the vulnerability detection problem is proposed. This work concentrates on improvement of ... 详细信息
来源: 评论
Security-oriented program transformations to cure integer overflow vulnerabilities
Security-oriented program transformations to cure integer ov...
收藏 引用
2012 3rd ACM Conference on Systems, Programming, and Applications: Software for Humanity, SPLASH 2012
作者: Coker, Zack Auburn University United States
来源: 评论
IntEQ: Recognizing Benign integer overflows via Equivalence Checking Across Multiple Precisions  16
IntEQ: Recognizing Benign Integer Overflows via Equivalence ...
收藏 引用
38th IEEE/ACM International Conference on Software Engineering (ICSE)
作者: Sun, Hao Zhang, Xiangyu Zheng, Yunhui Zeng, Qingkai Nanjing Univ State Key Lab Novel Software Technol Nanjing Jiangsu Peoples R China Nanjing Univ Dept Comp Sci & Technol Nanjing Jiangsu Peoples R China Purdue Univ Dept Comp Sci W Lafayette IN 47907 USA IBM TJ Watson Res Ctr Yorktown Hts NY USA
integer overflow (IO) vulnerabilities can be exploited by attackers to compromise computer systems. In the mean time, IOs can be used intentionally by programmers for benign purposes such as hashing and random number ... 详细信息
来源: 评论
Automated Code Repair Based on Inferred Specifications
Automated Code Repair Based on Inferred Specifications
收藏 引用
IEEE Cybersecurity Development (SecDev)
作者: Klieber, William Snavely, Will Carnegie Mellon Univ Software Engn Inst Pittsburgh PA 15213 USA
Techniques for automated code repair have the potential for greatly aiding in the development of secure and correct code. There are currently a few major difficulties confronting the development and deployment of tool... 详细信息
来源: 评论
Using Eye-tracking to Investigate Content Skipping: A Study on Learning Modules in Cybersecurity  14
Using Eye-tracking to Investigate Content Skipping: A Study ...
收藏 引用
14th IEEE International Conference on Intelligence and Security Informatics - Cybersecurity and Big Data (IEEE ISI)
作者: Raina, Sagar Bernard, Leon Taylor, Blair Kaza, Siddharth Mt St Mary Coll Div Math & Infonnat Technol Newburgh NY 12550 USA Towson Univ Dept Comp & Informat Sci Towson MD USA
Students skipping content is common in learning modules that present a large amount of information in a linear format. This may result in lower student engagement and learning. We proposed a theoretical model to reduc... 详细信息
来源: 评论
Dec :: Alpha :: Digital Ec-H1689-10 Alphaarchitecturehandbook 1992
收藏 引用
2016年
Dec :: Alpha :: Digital Ec-H1689-10 Alphaarchitecturehandbook 1992 by published by
来源: 评论
Ridge :: Ridge Procref 20Jan83
收藏 引用
2016年
Ridge :: Ridge Procref 20Jan83 by published by
来源: 评论
Dec :: Vax :: Handbook :: Vax Architecture Handbook Vol1 1977
收藏 引用
2016年
Dec :: Vax :: Handbook :: Vax Architecture Handbook Vol1 1977 by published by
来源: 评论
Dec :: Vax :: Vax Archhbkvol1 1977
收藏 引用
2016年
Dec :: Vax :: Vax Archhbkvol1 1977 by published by
来源: 评论