The abundance of defects in existing software systems is unsustainable. Addressing them is a dominant cost of software maintenance, which in turn dominates the life cycle cost of a …
US PATENT DOCUMENTS 7,526,758 B2 4/2009 Hasse et al. 7,639,714 B2 12/2009 Stolfo et al. 7,818,781 B2 10/2010 Golan et al. 7,975,059 B2 7/2011 Wang et al. 8,074,115 B2 …
SV Gupta, P Shenoy - US Patent 8,510,596, 2013 - Google Patents
G06F11/0703—Error or fault processing not based on redundancy, ie by taking additional measures to deal with the error or fault not making use of redundancy in operation, in …
X Wang, CC Pan, P Liu, S Zhu - US Patent 8,443,442, 2013 - Google Patents
Throughout the history of cyber security, buffer over? ow is one of the most serious vulnerabilities in computer systems.(Note that according to this disclosure 'buffer'could be a …
A Papadogiannakis, L Loutsis… - Proceedings of the …, 2013 - dl.acm.org
Code injection attacks continue to pose a threat to today's computing systems, as they exploit software vulnerabilities to inject and execute arbitrary, malicious code. Instruction Set …
Software monoculture is a significant liability from a computer security perspective. Single attacks can ripple through networks and affect large numbers of vulnerable systems. A …
H Okhravi, MA Rabe, TJ Mayberry, WG Leonard… - … Institute of Technology …, 2013 - mit.edu
This survey provides an overview of different cyber moving target techniques, their threat models, and their technical details. A cyber moving target technique refers to any technique …
M Henson, S Taylor - Applied Cryptography and Network Security: 11th …, 2013 - Springer
Modern computer systems exhibit a major weakness in that code and data are stored in the clear, unencrypted, within random access memory. As a result, numerous vulnerabilities …
A Barua, M Zulkernine… - 2013 18th International …, 2013 - ieeexplore.ieee.org
Vulnerable web browser extensions can be used by an attacker to steal users' credentials and lure users into leaking sensitive information to unauthorized parties. Current browser …