Back to Results
First PageMeta Content
C programming language / Data types / Primitive types / Software bugs / Constraint programming / Buffer overflow / C string handling / Pointer / Circular buffer / Software engineering / Computer programming / Computing


A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities David Wagner Jeffrey S. Foster Eric A. Brewer University of California, Berkeley
Add to Reading List

Document Date: 2000-02-24 15:34:44


Open Document

File Size: 139,69 KB

Share Result on Facebook

Currency

pence / USD / /

Facility

Buffer Overrun Vulnerabilities David Wagner Jeffrey S. Foster Eric A. Brewer University of California / C library / /

IndustryTerm

real-world applications / computing / constraint systems / constraint generation algorithm / infamous Internet worm / least solution / legacy applications / trouble handling large applications / e-> / deployed software package / /

OperatingSystem

Linux / /

Organization

University of California / Berkeley / National Aeronautics and Space Administration / Buffer Overrun Vulnerabilities David Wagner Jeffrey S. Foster Eric A. Brewer University / /

Position

tion Young Investigator / security auditor / programmer / /

ProgrammingLanguage

R / C / /

ProvinceOrState

California / /

Technology

constraint generation algorithm / DNS / Linux / API / /

SocialTag