Memory corruption

Results: 51



#Item
11Computer memory / Parallel computing / Data quality / Fault-tolerant computer systems / Apache Hadoop / Apache Software Foundation / Dynamic random-access memory / Data corruption / Soft error / Hard disk drive / Computer cluster / DIMM

Frameworks for massively parallel computing: Massively inefficient? Bianca Schroeder* (joint with Nosayba El-Sayed) University of Toronto

Add to Reading List

Source URL: tce.technion.ac.il

Language: English - Date: 2015-07-02 01:21:26
12

How to HeapSpray and Exploit memory corruption in IIS6 Author: Date: Overview

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2015-08-31 12:15:37
    13

    Identifying Memory Corruption Bugs with Compiler Instrumentations 이병영 (조지아공과대학교) @POC2014

    Add to Reading List

    Source URL: www.powerofcommunity.net

    Language: English
      14

      Learning Fine-Grained Structured Input for Memory Corruption Detection Lei Zhao1,2 , Debin Gao2 , Lina Wang1 1 2

      Add to Reading List

      Source URL: flyer.sis.smu.edu.sg

      Language: English - Date: 2014-12-17 01:40:50
        15

        Minemu: The World’s Fastest Taint Tracker Erik Bosman, Asia Slowinska, and Herbert Bos Vrije Universiteit Amsterdam Abstract. Dynamic taint analysis is a powerful technique to detect memory corruption attacks. However,

        Add to Reading List

        Source URL: www.few.vu.nl

        Language: English - Date: 2011-08-19 05:22:00
          16Computing / Multi-level cell / Flash memory / Soft error / Dynamic random-access memory / Phase-change memory / Data corruption / Error detection and correction / Fragmentation / Computer memory / Computer hardware / Non-volatile memory

          Approximate Storage in Solid-State Memories Adrian Sampson Jacob Nelson University of Washington

          Add to Reading List

          Source URL: homes.cs.washington.edu

          Language: English - Date: 2014-02-23 20:52:01
          17

          Using TraceX to Debug System Crashes Debugging a system crash in a complex application can be a daunting task. Most crashes involve some type of memory corruption due to stack overflow or some data access going out of bo

          Add to Reading List

          Source URL: gallery.mailchimp.com

          Language: English - Date: 2011-01-26 14:30:02
            18Political repression / Academics / Agriculturalists / Alberto Fujimori / Political corruption / Compulsory sterilization / Human rights / Reproductive rights / Ethics / Peru / Politics

            In Memoriam: Giulia Tamayo, This issue of Health and Human Rights is dedicated to the memory of Giulia Tamayo. In the course of preparing this special issue for publication, the world lost a tireless fighter fo

            Add to Reading List

            Source URL: www.hhrjournal.org

            Language: English - Date: 2014-12-09 14:42:34
            19Software bugs / Memory safety / Pointer / Stack buffer overflow / PaX / Buffer overflow / C / Vulnerability / Debugging / Computing / Software engineering / Computer programming

            MemSherlock: An Automated Debugger for Unknown Memory Corruption Vulnerabilities ∗ Emre C. Sezer Peng Ning Chongkyung Kil Department of Computer Science

            Add to Reading List

            Source URL: discovery.csc.ncsu.edu

            Language: English - Date: 2011-11-09 13:26:03
            20Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming

            Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University

            Add to Reading List

            Source URL: discovery.csc.ncsu.edu

            Language: English - Date: 2011-11-09 13:26:02
            UPDATE