Memory corruption

Results: 51



#Item
41Data types / Software bugs / Primitive types / Arrays / Buffer overflow / Pointer / C / Memory corruption / Stack / Computing / Software engineering / Computer programming

Buffer Overflow Semantic template 1 SOFTWARE-FAULT SIGN ERRORS #194 #195

Add to Reading List

Source URL: faculty.ist.unomaha.edu

Language: English - Date: 2011-01-22 13:32:51
42Telecommunications engineering / Computer storage / Information / Data management / Storage area network / File server / RAID / Data corruption / Flash memory / Computing / Computer hardware / Local area networks

Storage As A Service RB Hooks, III CTO, Storage Group Sun Microsystems Federal, Inc.

Add to Reading List

Source URL: www.epa.gov

Language: English - Date: 2009-12-21 14:29:54
43Software bugs / Memory management / Fault injection / Software testing / Pointer / C dynamic memory allocation / Memory corruption / C / Exception handling / Computing / Software engineering / Computer programming

An Empirical Study of Injected versus Actual Interface Errors Anna Lanzaro Roberto Natella

Add to Reading List

Source URL: www1.deeds.informatik.tu-darmstadt.de

Language: English - Date: 2014-02-05 17:09:16
44Electronics / Soft error / RAM parity / Error detection and correction / Dynamic random-access memory / DDR SDRAM / Forward error correction / Data corruption / Random-access memory / Computer memory / Computer hardware / Computing

PDF Document

Add to Reading List

Source URL: www.altera.com

Language: English - Date: 2012-04-02 14:58:42
45Computer programming / Buffer overflow / Pointer / Address space layout randomization / Stack / Shellcode / C / Uncontrolled format string / Memory corruption / Computing / Software bugs / Software engineering

0 CPM: Masking Code Pointers to Prevent Code Injection Attacks PIETER PHILIPPAERTS, YVES YOUNAN, STIJN MUYLLE and FRANK PIESSENS, DistriNet Research Group, University of Leuven SVEN LACHMUND and THOMAS WALTER, DOCOMO Eu

Add to Reading List

Source URL: www.fort-knox.org

Language: English - Date: 2013-11-05 16:02:36
46Data corruption / Forward error correction / Random-access memory / Computer memory / Error detection and correction / Data quality

Silent Corruptions KELEMEN Péter CERN IT

Add to Reading List

Source URL: w3.hepix.org

Language: English - Date: 2007-05-11 04:41:04
47Software bugs / Memory management / Memory safety / C dynamic memory allocation / Heap overflow / New / Valgrind / Memory corruption / Allocator / Computing / Software engineering / Computer programming

DieHard: Probabilistic Memory Safety for Unsafe Languages Emery D. Berger

Add to Reading List

Source URL: people.cs.umass.edu

Language: English - Date: 2006-04-04 08:43:47
48Digital media / DIMM / Memory scrubbing / Dynamic random-access memory / RAM parity / Soft error / Data corruption / Error detection and correction / Error / Computer memory / Computer hardware / Computing

PDF Document

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2009-06-24 22:59:50
49Digital media / ECC memory / Dynamic random-access memory / Chipkill / RAM parity / Error detection and correction / Memory scrubbing / Random-access memory / Data corruption / Computer memory / Computer hardware / Computing

PDF Document

Add to Reading List

Source URL: www.cs.rochester.edu

Language: English - Date: 2010-05-08 22:21:05
50Software bugs / Debuggers / Procedural programming languages / Application programming interfaces / Parallel computing / Pointer / IBM Rational Purify / C / Memory corruption / Computing / Computer programming / Software engineering

PDF Document

Add to Reading List

Source URL: jjc.public.iastate.edu

Language: English - Date: 2010-07-08 15:47:21
UPDATE