نتایج جستجو برای: overflow

تعداد نتایج: 6760  

2005
Kendra Kratkiewicz Richard Lippmann

A taxonomy that uses twenty-two attributes to characterize Cprogram overflows was used to construct 291 small C-program test cases that can be used to diagnostically determine the basic capabilities of static and dynamic analysis buffer overflow detection tools. Attributes in the taxonomy include the buffer location (e.g. stack, heap, data region, BSS, shared memory); scope difference between b...

2006

Buffer overflow attack is the main attack method that most if not all existing malicious worms use to propagate themselves from machine to machine. Although a great deal of research has been invested in defense mechanisms against buffer overflow attack, most of them require modifications to the network applications and/or the platforms that host them. This paper presents a network-based buffer ...

2008
Kelvin Ku

Software Model-Checking: Benchmarking and Techniques for Buffer Overflow Analysis Kelvin Ku Master of Science Graduate Department of Computer Science University of Toronto 2008 Software model-checking based on abstraction-refinement has recently achieved widespread success in verifying critical properties of real-world device drivers. We believe this success can be replicated for the problem of...

2005
Glenn T. Wetzel David Goldstein Joan Heller Brown

Isolated superfused rat atria release [H]acetylcholine when depolarized with 57 mM potassium. The depolarization-induced overflow of [H]acetylcholine is markedly inhibited by micromolar concentrations of epinephrine and norepinephrine. The a,-selective adrenergic agonist methoxamine also inhibits tritium overflow, but the «2-selective adrenergic agonist clonidine and the 0-adrenergic agonist is...

Journal: :JSW 2014
Chunguang Kuang Chunlei Wang Minhuan Huang

-Since the first buffer overflow problem occurred, many detection techniques have been presented. These techniques are effective in detecting most attacks, but some attacks still remain undetected. In order to be more effective, a memory-size-assisted buffer overflow detection(MBOD) is presented. The key feature of buffer overflow is that the size of the source memory is bigger than the size of...

2007
Andrzej Chydzinski

In this report we deal with the time to buffer overflow in a finite-buffer queue with MMPP (Markov-modulated Poisson process) arrivals. The results include a closed-form formula for the transform of the distribution of the time to buffer overflow. The main benefit of this formula is that, using properties of the transform, we can easily compute the average overflow time and all the moments (var...

2013
Andrzej Chydzinski

In this paper a study on the buffer overflow period in a finite-buffer queue is presented. A special attention is paid to the autocorrelation and batch arrivals, which are supposed to mimic the properties of real arrival processes. Using the batch Markovian arrival process, formulas for the duration of the first, subsequent and stationary overflow periods, as well as formulas for the distributi...

2013
Sachin B. Jadhav Deepak Choudhary

MCAIDS-Machine Code Analysis Intrusion Detection System for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. With the increasing access of Internet,the Internet threat takes a form of attack, targetting individuals users to gain control over network and data. Buffer overlow is one of the most occuring security vulnerability in c...

1999
Ad Ridder

In this paper we study the rare event of overflow in a Markov fluid queue with finite buffer and many input sources. The probability of this rare event will be estimated by simulations. We present a highly efficient importance sampling procedure to speed up the simulations. The implemented change of meausure is suggested after a large deviations analysis of the overflow probability. This analys...

Journal: :Scientific American 1914

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید