6 Hits in 2.8 sec

Process Analysis of Buffer Overflow Based on Dynamic Binary Platform

Fei Kang, Pengcheng Dong, Hui Shu, Jing Sun
2012 Proceedings of the 2nd International Conference on Computer Application and System Modeling   unpublished
Based on dynamic binary platform, an analysis method for buffer overflow is described in detail and a prototype system is implemented.  ...  The prototype system is of important value in efficient analysis of 0day and rapid patching software.  ...  Researchers have carried out in-depth study for detection of buffer overflow, and have proposed a variety of detection methods.  ... 
doi:10.2991/iccasm.2012.268 fatcat:2p5jutma6fhcnjv6hxbqi563zm

An experimental study of security vulnerabilities caused by errors

J. Xu, S. Chen, Z. Kalbarczyk, R.K. Iyer
Proceedings International Conference on Dependable Systems and Networks  
The design and evaluation of a new encoding scheme that reduces or eliminates this problem is presented.  ...  a transient window of vulnerability), and (c) 7-12% resulted in fail silence violations.  ...  Acknowledgment This work was supported in part by NSF Grant CCR-9902026 and in part by a grant from Motorola Inc. as part of the Motorola Center for Communications.  ... 
doi:10.1109/dsn.2001.941426 dblp:conf/dsn/XuCKI01 fatcat:xl7atlzyfzgb3innz5a3wpjo3m


2016 International Journal of Advance Engineering and Research Development  
Particular points depending of the system and the business. • Iteration. Covering the necessity of a superficial analysis and after, more detailed descriptions.  ...  Extensible foundation for new architecture design and analysis tools.  ...  This aids communication by giving a common language in which to communicate said architecture, allows formal analysis and simulation, allows reutilization of software components, among other advantages  ... 
doi:10.21090/ijaerd.030476 fatcat:llzg42pevjhhrgssvlllgoy3zq


Lawrence L. You, Kristal T. Pollack, Darrell D. E. Long, K. Gopinath
2011 ACM Transactions on Storage  
A new technique, harmonic super-fingerprinting, is also used for obtaining successively more accurate (but also more costly) measures of similarity to identify the existing objects in a very large data  ...  As an aid to the design of such systems, we evaluate and present various parameters that affect the efficiency of a storage system using empirical data.  ...  ACKNOWLEDGMENTS We thank Christos Karamonolis, Kave Eshghi and George Forman of Hewlett-Packard Laboratories for their help and insight into the behavior of file chunking.  ... 
doi:10.1145/1970348.1970351 fatcat:bmuwmv3zq5h75jlmk57xxiu6e4

Program abstraction and efficient execution

Boldizsár Németh, Máté Tejfel
The dissertation contains case studies of language design but also show the pitfalls of developing a new programming language.  ...  However, the second approach provides a more complete and systematic analysis of the UML model.  ...  First, it sets the time of the last logging to the current time, then it adds the log message to the list of messages, and then increments the size of the list by one. 2 A kari hivatal ügyintézője tölti  ... 
doi:10.15476/elte.2019.217 fatcat:lyfw2b5uevem5kxn5gexrgp4ku

SENSORDEVICES 2013 Committee SENSORDEVICES Advisory Chairs Optical sensors

Francois Pacull, Cea-Leti Minatec, France, Sergey Yurish, Ifsa -Barcelona, Spain, Sergey Yurish, Ifsa -Barcelona, Spain, Vítor Carvalho, Marco Tartagni, Subodh Singhal (+49 others)
The evolution of the nano-and microtechnologies, nanomaterials, and the new business services make the sensor device industry and research on sensor-themselves very challenging.  ...  We hope that SENSORDEVICES 2013 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the area of sensor device technologies  ...  ACKNOWLEDGMENT The authors wish to thank Anubhav Tripathi and Domenico Pacifici for their support and helpful discussion for this study.  ...