نتایج جستجو برای: overflow

تعداد نتایج: 6760  

2003
Crispin Cowan Steve Beattie John Johansen Perry Wagle

Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the dominant form of software security vulnerability. This is because most buffer overflow defenses provide only partial coverage, and the attacks have adapted to exploit problems that are not well-defended, such as heap overflows. This paper presents PointGuard, a compiler ...

2000
Hui-Nien Hung Yi-Bing Lin Nan-Fu Peng Shun-Ren Yang

In a personal communications service (PCS) network, mobility databases called visitor location registers (VLRs) are utilized to temporarily store the subscription data and the location information for the roaming users. Because of user mobility, it is possible that the VLR is full when a mobile user arrives. Under such a circumstance, the incoming user has no VLR record and thus cannot receive ...

Journal: :American journal of physiology. Heart and circulatory physiology 2008
Heather Macarthur Thomas C Westfall Gerald H Wilken

Current evidence suggests that hyperactivity of the sympathetic nervous system and endothelial dysfunction are important factors in the development and maintenance of hypertension. Under normal conditions the endothelial mediator nitric oxide (NO) negatively modulates the activity of the norepinephrine portion of sympathetic neurotransmission, thereby placing a "brake" on the vasoconstrictor ab...

2003
Manish Prasad Tzi-cker Chiueh

Buffer overflow attack is the most common and arguably the most dangerous attack method used in Internet security breach incidents reported in the public literature. Various solutions have been developed to address the buffer overflow vulnerability problem in both research and commercial communities. Almost all the solutions that provide adequate protection against buffer overflow attacks are i...

Journal: :IEEE Trans. Parallel Distrib. Syst. 2003
Wenhao Shan Pingzhi Fan Yi Pan

With the increase of teletraffic demands in mobile cellular system, hierarchical cellular systems (HCSs) have been adopted extensively for more efficient channel utilization and better GoS (Grade of Services). A practical issue related to HCS is to design a scheme for controlling and allocating call traffic to different layers. There are several strategies to deal with this problem, such as no ...

1999
Haining Wang Kang G. Shin

Random Early Detection (RED) was proposed as an active gateway queue-management mechanism. This paper proposes to alter the RED design guideline that unconditionally allows transient congestion, and evaluates its impacts. This unconditional allowance of transient congestion is shown to be harmful when the queue is near full, because it causes buffer overflow at a gateway. Buffer overflow at a g...

Journal: :Perform. Eval. 1998
Boris Tsybakov Nicolas D. Georganas

From real measurements in high-speed communications networks, it was recently shown that network traffic may demonstrate properties of long-range dependency peculiar to the self-similar stochastic process. It was also shown by measurements that with increasing buffer capacity, the resulting cell loss is not reduced exponentially fast, as it is predicted by queueing theory applied to traditional...

Journal: :CoRR 2013
Jinghui Zhang Tong Ye Tony T. Lee Fangfang Yan Weisheng Hu

Despite the high throughput and low complexity achieved by input scheduling based on Birkhoff-von-Neumann (BvN) decomposition; the performance of the BvN switch becomes less predictable when the input traffic is bursty. In this paper, we propose a deflection-compensated BvN (D-BvN) switch architecture to enhance the quasi-static scheduling based on BvN decomposition. The D-BvN switches provide ...

Journal: :Journal of Computer Security 2011
Chao Zhang Wei Zou Tielei Wang Yu Chen Tao Wei

One of the top two causes of software vulnerabilities in operating systems is the integer overflow. A typical integer overflow vulnerability is the Integer Overflow to Buffer Overflow (IO2BO for short) vulnerability. IO2BO is an underestimated threat. Many programmers have not realized the existence of IO2BO and its harm. Even for those who are aware of IO2BO, locating and fixing IO2BO vulnerab...

1998
Dimitris Bertsimas Ioannis Ch. Paschalidis John N. Tsitsiklis

We consider a multiclass multiplexer with support for multiple service classes and dedicated buffers for each service class. Under specific scheduling policies for sharing bandwidth among these classes, we seek the asymptotic (as the buffer size goes to infinity) tail of the buffer overflow probability for each dedicated buffer. We assume dependent arrival and service processes as is usually th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید