Výsledky vyhledávání - Buffer overflow exploit
-
1
Autoři:
Zdroj: Madani: Jurnal Ilmiah Multidisiplin; Vol 2, No 8 (2024): September; 87-94
Témata: Buffer Overflow, Address Space Layout Randomization, computer aplication systems, operating system
Popis souboru: application/pdf
Relation: https://jurnal.penerbitdaarulhuda.my.id/index.php/MAJIM/article/view/2633/2725; https://jurnal.penerbitdaarulhuda.my.id/index.php/MAJIM/article/view/2633
-
2
Autoři:
Zdroj: Труды Института системного программирования РАН, Vol 26, Iss 3, Pp 127-144 (2018)
Témata: классификация ошибок, эксплуатация уязвимостей, бинарный код, динамический анализ, символьное выполнение, Electronic computers. Computer science, QA75.5-76.95
Popis souboru: electronic resource
Relation: https://ispranproceedings.elpub.ru/jour/article/view/808; https://doaj.org/toc/2079-8156; https://doaj.org/toc/2220-6426
Přístupová URL adresa: https://doaj.org/article/048c2af043244504a9185968795fd6dc
-
3
Autoři:
Zdroj: 2012 Fourth International Conference on Multimedia Information Networking and Security. :87-90
Témata: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
4
Autoři:
Zdroj: JISR Management and Social Sciences & Economics, Vol 1, Iss 2 (2003)
Témata: Buffer Overflow, prevent attackers, hackers, security vulnerabilities, Economic theory. Demography, HB1-3840, Business, HF5001-6182, Social sciences (General), H1-99
Popis souboru: electronic resource
Relation: https://jisrmsse.szabist.edu.pk/index.php/szabist/article/view/414; https://doaj.org/toc/2616-7476; https://doaj.org/toc/1998-4162
Přístupová URL adresa: https://doaj.org/article/091955036e5540e0b54d13e042a54546
-
5
Autoři:
Zdroj: IEEE Access, Vol 11, Pp 52009-52025 (2023)
Témata: Buffer overflow, exploitation detection, machine learning, random forests, XGBoost, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
Popis souboru: electronic resource
Přístupová URL adresa: https://doaj.org/article/53dfa4377b794ac7989c6b0f1ff6c71f
-
6
-
7
Autoři:
Zdroj: Lecture Notes in Computer Science ISBN: 9783540201762
Přístupová URL adresa: https://link.springer.com/chapter/10.1007/10958513_28
https://koreauniv.pure.elsevier.com/en/publications/run-time-support-for-detection-of-memory-access-violations-to-pre
https://dblp.uni-trier.de/db/conf/isw/isc2003.html#RamaraoTL03
https://rd.springer.com/chapter/10.1007/10958513_28 -
8
Autoři: a další
Zdroj: AusCERT 2004 Asia Pacific Information Technology Security Conference Proceedings R&D Stream
URL:
https://eprints.qut.edu.au/21172/1/21172.pdf http://conference.auscert.org.au/conf2004/index.html https://eprints.qut.edu.au/21172/1/21172.pdf http://conference.auscert.org.au/conf2004/index.html
Andersson, Stig, Clark, Andrew, & Mohay, George (2004) Network-Based Buffer Overflow Detection by Exploit Code Analysis. In Kerr, K, Mohay, G, & Clark, A (Eds.) AusCERT 2004 Asia Pacific Information Technology Security Conference Proceedings R&D Stream. University of Queensland, Brisbane, Australia, pp. 39-53. -
9
-
10
-
11
Autoři: Lindblom, Henrik
Témata: Computer Security, Operating Systems, Control-flow hijack attacks, Buffer Overflow, Stack, DOS, Computer Sciences, Datavetenskap (datalogi), Student thesis, info:eu-repo/semantics/bachelorThesis, text
URL:
http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-214298
UMNAD ; 1437 -
12
-
13
Autoři: Li, Chang-Yu
Thesis Advisors: Bing Chiang Jeng, Jinn-Shing Cheng, D. J. Guan, Chen Chia Mei
Témata: system call, association rules, Buffer Overflow, exploit code
Popis souboru: application/pdf
-
14
Autoři: Jason Deckard
Resource Type: eBook.
Témata: Computer viruses, Computer security
-
15
Autoři:
Přispěvatelé:
Popis souboru: application/pdf
-
16
Autoři:
-
17
-
18
-
19
Autoři: a další
Zdroj: Vrije Universiteit Amsterdam Repository
Témata: Bounds Checking, LLVM, Memory Safety, Pointer Tagging, SDG 16 - Peace, Justice and Strong Institutions, Conference contribution
-
20
Autoři:
Zdroj: IEEE Access, Vol 13, Pp 76894-76913 (2025)
Témata: Bidirectional encoder, binary security, buffer overflow, machine learning, neural network, transformer-based embedding, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
Popis souboru: electronic resource
Přístupová URL adresa: https://doaj.org/article/e717df07d2404d6f9713bfc8ba83d3cb
Nájsť tento článok vo Web of Science
Full Text Finder