نتایج جستجو برای: overflow
تعداد نتایج: 6760 فیلتر نتایج به سال:
Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the dominant form of software security vulnerability. This is because most buffer overflow defenses provide only partial coverage, and the attacks have adapted to exploit problems that are not well-defended, such as heap overflows. This paper presents PointGuard, a compiler ...
In a personal communications service (PCS) network, mobility databases called visitor location registers (VLRs) are utilized to temporarily store the subscription data and the location information for the roaming users. Because of user mobility, it is possible that the VLR is full when a mobile user arrives. Under such a circumstance, the incoming user has no VLR record and thus cannot receive ...
Current evidence suggests that hyperactivity of the sympathetic nervous system and endothelial dysfunction are important factors in the development and maintenance of hypertension. Under normal conditions the endothelial mediator nitric oxide (NO) negatively modulates the activity of the norepinephrine portion of sympathetic neurotransmission, thereby placing a "brake" on the vasoconstrictor ab...
Buffer overflow attack is the most common and arguably the most dangerous attack method used in Internet security breach incidents reported in the public literature. Various solutions have been developed to address the buffer overflow vulnerability problem in both research and commercial communities. Almost all the solutions that provide adequate protection against buffer overflow attacks are i...
With the increase of teletraffic demands in mobile cellular system, hierarchical cellular systems (HCSs) have been adopted extensively for more efficient channel utilization and better GoS (Grade of Services). A practical issue related to HCS is to design a scheme for controlling and allocating call traffic to different layers. There are several strategies to deal with this problem, such as no ...
Random Early Detection (RED) was proposed as an active gateway queue-management mechanism. This paper proposes to alter the RED design guideline that unconditionally allows transient congestion, and evaluates its impacts. This unconditional allowance of transient congestion is shown to be harmful when the queue is near full, because it causes buffer overflow at a gateway. Buffer overflow at a g...
From real measurements in high-speed communications networks, it was recently shown that network traffic may demonstrate properties of long-range dependency peculiar to the self-similar stochastic process. It was also shown by measurements that with increasing buffer capacity, the resulting cell loss is not reduced exponentially fast, as it is predicted by queueing theory applied to traditional...
Despite the high throughput and low complexity achieved by input scheduling based on Birkhoff-von-Neumann (BvN) decomposition; the performance of the BvN switch becomes less predictable when the input traffic is bursty. In this paper, we propose a deflection-compensated BvN (D-BvN) switch architecture to enhance the quasi-static scheduling based on BvN decomposition. The D-BvN switches provide ...
One of the top two causes of software vulnerabilities in operating systems is the integer overflow. A typical integer overflow vulnerability is the Integer Overflow to Buffer Overflow (IO2BO for short) vulnerability. IO2BO is an underestimated threat. Many programmers have not realized the existence of IO2BO and its harm. Even for those who are aware of IO2BO, locating and fixing IO2BO vulnerab...
We consider a multiclass multiplexer with support for multiple service classes and dedicated buffers for each service class. Under specific scheduling policies for sharing bandwidth among these classes, we seek the asymptotic (as the buffer size goes to infinity) tail of the buffer overflow probability for each dedicated buffer. We assume dependent arrival and service processes as is usually th...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید