Search Results - "exploiting buffer overflow"
-
1
Authors:
Source: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). :1921-1927
Subject Terms: 0103 physical sciences, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, 01 natural sciences
-
2
Authors:
Source: ACM SIGCSE Bulletin. 35:172-176
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Access URL: http://portal.acm.org/citation.cfm?doid=611892.611962
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.15.6998&rep=rep1&type=pdf
https://dblp.uni-trier.de/db/conf/sigcse/sigcse2003.html#PhillipsT03
http://guimli.free.fr/download/Exploring%20Security%20Vulnerabilities%20by%20Exploiting%20Buffer%20Overflow.pdf
https://doi.org/10.1145/611892.611962
http://www.cs.uwec.edu/~tan/sigcse03.pdf -
3
Authors:
Source: Proceedings of the 34th SIGCSE technical symposium on Computer science education - SIGCSE '03
-
4
Contributors: The Pennsylvania State University CiteSeerX Archives
Subject Terms: Pedagogy, Buffer Overflow
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.82.1023; http://www.cs.uwec.edu/~phillips/papers/bufferOverflow.pdf
-
5
Authors: et al.
Contributors: et al.
Subject Terms: Pedagogy, Buffer Overflow
File Description: application/postscript
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.6998; http://www.cs.uwec.edu/~phillips/papers/bufferOverflow.ps.gz
-
6
Authors:
Source: Procedia Computer Science. 2019, Vol. 160, p9-14. 6p.
Subject Terms: Leakage, Design protection, Computer security vulnerabilities, Security systems
-
7
Authors: et al.
Source: Knowledge-Based Intelligent Information & Engineering Systems (9783540465379); 2006, p737-744, 8p
-
8
Authors: et al.
Source: IEEE/ACM Transactions on Networking; Feb2010, Vol. 18 Issue 1, p53-66, 14p
-
9
Authors: Jones, David (AUTHOR)
Source: Cybersecurity Dive. 2/13/2025, pN.PAG-N.PAG. 1p.
Subject Terms: *DATA corruption, *COMPUTER security vulnerabilities, *COMPUTER software development, SOFTWARE architecture, DESIGN software
-
10
Authors: et al.
Source: Electronics (2079-9292); Dec2023, Vol. 12 Issue 23, p4741, 15p
Subject Terms: PETRI nets, COMPUTER security vulnerabilities
-
11
Authors: Jason Deckard
Resource Type: eBook.
Subjects: Computer viruses, Computer security
-
12
-
13
Authors: Tan, Hailun
Index Terms: Network Programming, Broadcast Authentication, Wireless Sensor Network, Code Dissemination, Trusted Platform Module, Sensor Worm Attack, Wormhole Attack, Remote Attestation, Secure Network Protocol, doctoral thesis, http://purl.org/coar/resource_type/c_db06
-
14
Authors: et al.
Source: Future Internet; May2023, Vol. 15 Issue 5, p185, 16p
Subject Terms: DRIVER assistance systems
-
15
Authors:
Source: Electrical Engineering and Computer Science
Index Terms: Buffer overflow, format string overflow, array and pointer range checking, Linux, ELF, Computer Sciences, text
-
16
Authors:
Source: Software: Practice & Experience; 4/25/2003, Vol. 33 Issue 5, p423, 38p
-
17
Authors: et al.
Source: IET Software (Wiley-Blackwell); Oct2022, Vol. 16 Issue 5, p527-541, 15p
Subject Terms: K-means clustering, ALGORITHMS, CLUSTER analysis (Statistics), SOURCE code, MALWARE, DATA analysis
-
18
Authors: et al.
Source: Applied Sciences (2076-3417); Jul2022, Vol. 12 Issue 13, pN.PAG-N.PAG, 31p
Subject Terms: APPLICATION software, COMPILERS (Computer programs), SYSTEMS software, AUTHORSHIP
-
19
Authors:
Source: Applied Sciences (2076-3417); Feb2022, Vol. 12 Issue 3, p1598, 19p
-
20
Authors: Kosolapov, Y. V.
Source: Automatic Control & Computer Sciences; 2020, Vol. 54 Issue 7, p573-583, 11p
Nájsť tento článok vo Web of Science
Full Text Finder