Back to Results
First PageMeta Content
Software bugs / Computer errors / Assembly languages / Buffer overflow / Stack buffer overflow / Denial-of-service attack / Stack / Call stack / Address space layout randomization / Computing / Software engineering / Computer programming


Automatic Diagnosis and Response to Memory Corruption Vulnerabilities Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris Bookholt Cyber Defense Laboratory Department of Computer Science North Carolina State University
Add to Reading List

Document Date: 2011-11-09 13:26:02


Open Document

File Size: 275,36 KB

Share Result on Facebook

City

Alexandria / /

Company

pr co / Case / Computer-Communication Networks / /

Country

United States / /

Currency

USD / /

/

Event

Product Issues / /

Facility

Computer Science North Carolina State University / C library / /

IndustryTerm

signature matching algorithm / detection systems / evaluation using real world applications / invasive software / diagnosis algorithm / randomized network services / message signature to network / bug diagnosis algorithm / Internet infrastructure / message filtering algorithm / real world network applications / network service applications / server applications / networked computer systems / web server / malicious network / secure shell server media streaming svr file / ghttpd web server / vulnerable systems / automatic diagnosis algorithm / automatic bug diagnosis algorithm / proposed system runs network service applications / message filtering algorithms / inside non-trivial server applications / real world network service applications / large-scale Internet worms / Apache web server / stat server / /

OperatingSystem

Unix system / Linux / Fedora Core 3 / /

Organization

Chris Bookholt Cyber Defense Laboratory Department / North Carolina State University / /

Person

Chris Bookholt Cyber / Yan Zhai / Jun Xu / /

Position

Protection General / rt / programmer / /

Product

OpenSSH server / then trace / OpenSSH / address / /

ProvinceOrState

Virginia / /

Technology

application protocols / bug diagnosis algorithm / signature matching algorithm / following algorithm / Linux / automatic diagnosis algorithm / Unix system / HTTP / message filtering algorithms / diagnosis algorithm / secure shell / message filtering algorithm / underlying service protocol / Operating Systems / automatic bug diagnosis algorithm / web server / /

SocialTag