Zobrazeno 1 - 10
of 149
pro vyhledávání: '"Bounds checking"'
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Logozzo, Francesco ⁎, Fähndrich, Manuel
Publikováno v:
In Science of Computer Programming 2010 75(9):796-807
Autor:
Baik Song An
Publikováno v:
ICTC
This study provides an architectural support for fast and efficient memory protection for multithread work- loads in data-intensive computing environments. Boundary information used for preventing illegal pointer manipulation can be effectively manag
Autor:
J. Peter Brady, Sean W. Smith, Rebecca Shapiro, Ira Ray Jenkins, Sergey Bratus, Prashant Anantharaman
Publikováno v:
HotSoS
Spectre attacks have drawn much attention since their announcement. Speculative execution creates so-called transient instructions, those whose results are ephemeral and not committed architecturally. However, various side-channels exist to extract t
Publikováno v:
CGO
Recent Spectre attacks exploit hardware speculative execution to read forbidden data. The attacks speculatively load forbidden data in misspeculated paths creating a side channel via the microarchitectural state which is not cleaned up after a misspe
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Proceedings of the 13th EuroSys Conference, EuroSys 2018, 1-14
STARTPAGE=1;ENDPAGE=14;TITLE=Proceedings of the 13th EuroSys Conference, EuroSys 2018
EuroSys
Kroes, T, Koning, K, van der Kouwe, E, Bos, H & Giuffrida, C 2018, Delta Pointers : Buffer Overflow Checks Without the Checks . in Proceedings of the 13th EuroSys Conference, EuroSys 2018 ., 22, Association for Computing Machinery, Inc, pp. 1-14, 13th EuroSys Conference, EuroSys 2018, Porto, Portugal, 23/04/18 . https://doi.org/10.1145/3190508.3190553
STARTPAGE=1;ENDPAGE=14;TITLE=Proceedings of the 13th EuroSys Conference, EuroSys 2018
EuroSys
Kroes, T, Koning, K, van der Kouwe, E, Bos, H & Giuffrida, C 2018, Delta Pointers : Buffer Overflow Checks Without the Checks . in Proceedings of the 13th EuroSys Conference, EuroSys 2018 ., 22, Association for Computing Machinery, Inc, pp. 1-14, 13th EuroSys Conference, EuroSys 2018, Porto, Portugal, 23/04/18 . https://doi.org/10.1145/3190508.3190553
Despite decades of research, buffer overflows still rank among the most dangerous vulnerabilities in unsafe languages such as C and C++. Compared to other memory corruption vulnerabilities, buffer overflows are both common and typically easy to explo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a7beb61dbdadd7ca5fb56dd864d5c7cb
https://research.vu.nl/en/publications/4de3ea56-0adb-44b4-ace2-c4d4e49aeb5d
https://research.vu.nl/en/publications/4de3ea56-0adb-44b4-ace2-c4d4e49aeb5d
Autor:
Malin Källén, Tobias Wrigstad
Publikováno v:
MPLR
The study of Java as a programming language for scientific computing is warranted by simpler, more extensible and more easily maintainable code. Previous work on refactoring a C++ scientific computing code base to follow best practises of object-orie
Eliminating Redundant Bounds Checks in Dynamic Buffer Overflow Detection Using Weakest Preconditions
Publikováno v:
IEEE Transactions on Reliability. 65:1682-1699
Spatial errors (e.g., buffer overflows) continue to be one of the dominant threats to software reliability and security in C/C++ programs. Presently, the software industry typically enforces spatial memory safety by instrumentation. Due to high overh