A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Process Analysis of Buffer Overflow Based on Dynamic Binary Platform
2012
Proceedings of the 2nd International Conference on Computer Application and System Modeling
unpublished
Based on dynamic binary platform, an analysis method for buffer overflow is described in detail and a prototype system is implemented. ...
The prototype system is of important value in efficient analysis of 0day and rapid patching software. ...
Researchers have carried out in-depth study for detection of buffer overflow, and have proposed a variety of detection methods. ...
doi:10.2991/iccasm.2012.268
fatcat:2p5jutma6fhcnjv6hxbqi563zm
An experimental study of security vulnerabilities caused by errors
Proceedings International Conference on Dependable Systems and Networks
The design and evaluation of a new encoding scheme that reduces or eliminates this problem is presented. ...
a transient window of vulnerability), and (c) 7-12% resulted in fail silence violations. ...
Acknowledgment This work was supported in part by NSF Grant CCR-9902026 and in part by a grant from Motorola Inc. as part of the Motorola Center for Communications. ...
doi:10.1109/dsn.2001.941426
dblp:conf/dsn/XuCKI01
fatcat:xl7atlzyfzgb3innz5a3wpjo3m
REVERSE ENGINEERING – THE REVIEW
2016
International Journal of Advance Engineering and Research Development
Particular points depending of the system and the business. • Iteration. Covering the necessity of a superficial analysis and after, more detailed descriptions. ...
Extensible foundation for new architecture design and analysis tools. ...
This aids communication by giving a common language in which to communicate said architecture, allows formal analysis and simulation, allows reutilization of software components, among other advantages ...
doi:10.21090/ijaerd.030476
fatcat:llzg42pevjhhrgssvlllgoy3zq
PRESIDIO
2011
ACM Transactions on Storage
A new technique, harmonic super-fingerprinting, is also used for obtaining successively more accurate (but also more costly) measures of similarity to identify the existing objects in a very large data ...
As an aid to the design of such systems, we evaluate and present various parameters that affect the efficiency of a storage system using empirical data. ...
ACKNOWLEDGMENTS We thank Christos Karamonolis, Kave Eshghi and George Forman of Hewlett-Packard Laboratories for their help and insight into the behavior of file chunking. ...
doi:10.1145/1970348.1970351
fatcat:bmuwmv3zq5h75jlmk57xxiu6e4
Program abstraction and efficient execution
2019
The dissertation contains case studies of language design but also show the pitfalls of developing a new programming language. ...
However, the second approach provides a more complete and systematic analysis of the UML model. ...
First, it sets the time of the last logging to the current time, then it adds the log message to the list of messages, and then increments the size of the list by one. 2 A kari hivatal ügyintézője tölti ...
doi:10.15476/elte.2019.217
fatcat:lyfw2b5uevem5kxn5gexrgp4ku
SENSORDEVICES 2013 Committee SENSORDEVICES Advisory Chairs Optical sensors
unpublished
The evolution of the nano-and microtechnologies, nanomaterials, and the new business services make the sensor device industry and research on sensor-themselves very challenging. ...
We hope that SENSORDEVICES 2013 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the area of sensor device technologies ...
ACKNOWLEDGMENT The authors wish to thank Anubhav Tripathi and Domenico Pacifici for their support and helpful discussion for this study. ...
fatcat:wus64ltdincabfcflr3fmukan4