Výsledky vyhledávání - "buffer overflow attacks"
-
1
Assuring software security against buffer overflow attacks in embedded software development life cycle
ISBN: 1424454271, 9781424454273ISSN: 1738-9445Vydáno: IEEE 01.02.2010Vydáno v 2010 The 12th International Conference on Advanced Communication Technology (ICACT) (01.02.2010)“…, mitigates, and removes the vulnerabilities throughout system development life cycle. This paper is intended to introduce embedded software analyzer to challenges involved in designing secure embedded systems against buffer overflow attacks…”
Získat plný text
Konferenční příspěvek -
2
Omnipod CTO Available for Comments and Observations in Regards to Reports on Yahoo Instant Messenger Security Flaw; Omnipod's Secure IM Solution Not Vulnerable to Buffer Overflow Attacks
Vydáno: New York Business Wire 08.12.2003Vydáno v Business Wire (08.12.2003)“…Recognized as a contributing writer and researcher on the subject of Enterprise Instant Messaging, Omnipod's Chief Technology Officer, [Matthew Hunt…”
Získat plný text
Newsletter -
3
Polymorphic attacks and network topology: Application of concepts from natural systems
ISBN: 1109745796, 9781109745795Vydáno: ProQuest Dissertations & Theses 01.01.2010“…The growing complexity of interactions between computers and networks makes the subject of network security a very interesting one…”
Získat plný text
Dissertation -
4
Preventing buffer overflows with binary rewriting
ISBN: 1124074333, 9781124074337Vydáno: ProQuest Dissertations & Theses 01.01.2010“… to the success of buffer overflow attacks since most, if not all, buffer overflow defenses are source…”
Získat plný text
Dissertation -
5
Defending On-Line Web Application Security with User-Behavior Surveillance
ISBN: 9780769531021, 0769531024Vydáno: IEEE 01.03.2008Vydáno v Proceedings of the Third International Conference on Availability, Security, and Reliability : March 4-7, 2008, Barcelona, Spain (01.03.2008)“… business. These "open", and widely "web enabled" applications are subject to greater and greater levels and types of attacks as hackers exploit vulnerabilities within the software like SQL injection and cross site scripts (XSS) attack…”
Získat plný text
Konferenční příspěvek -
6
Questions dog Cisco routers
ISSN: 0887-7661Vydáno: Southborough Foundry 08.08.2005Vydáno v Network World (08.08.2005)“…Heavy fallout continues on several fronts from a security researcher's recent disclosure that unpatched Cisco routers can be subverted by buffer-overflow attacks and shell-code exploits…”
Získat plný text
Trade Publication Article

