A source code perspective C overflow vulnerabilities exploit taxonomy based on well-defined criteria / Nurul Haszeli Ahmad
Despite various works for more than three decades , C overflow vulnerabilities is still a major security issue, as it has contributed to more than 30% of all recorded vulnerabilities and has been the root cause of many successful exploits. One of the main causes lies in the C software developers the...
| Main Author: | Ahmad, Nurul Haszeli |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/27288/ |
Similar Items
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
by: Hazim, Hanif, et al.
Published: (2021)
by: Hazim, Hanif, et al.
Published: (2021)
Numerical study of irregular wave overtopping and overflow
by: Soliman, Akram S M
Published: (2003)
by: Soliman, Akram S M
Published: (2003)
Scale effect of storm sewage overflow structure
by: S. Y. Lim ,, et al.
Published: (1990)
by: S. Y. Lim ,, et al.
Published: (1990)
Defining criterias of shariah compliant hotel rooms
by: Saifuddin, Syaza, et al.
Published: (2017)
by: Saifuddin, Syaza, et al.
Published: (2017)
Defining criterias of Shariah compliant hotel rooms
by: Saifuddin, Syaza, et al.
Published: (2016)
by: Saifuddin, Syaza, et al.
Published: (2016)
Battening Down / Greedy after this gossip / The town and river overflow
by: Kinsella, John
Published: (2011)
by: Kinsella, John
Published: (2011)
Deconstruction Overflowed: Doing Undoing from Philosophy's Outer Edge
by: Briggs, Robert
Published: (2023)
by: Briggs, Robert
Published: (2023)
A user defined taxonomy of factors that divide online information retrieval sessions
by: Ye, Chaoyu, et al.
Published: (2014)
by: Ye, Chaoyu, et al.
Published: (2014)
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014)
by: Teh, Jia Yew, et al.
Published: (2014)
Flood Vulnerability and Risk Assessment with Spatial Multi-criteria Evaluation
by: Masuya, Akiko
Published: (2013)
by: Masuya, Akiko
Published: (2013)
Application of soft computing techniques to adaptive user buffer overflow control on the Internet
by: Lin, W., et al.
Published: (2006)
by: Lin, W., et al.
Published: (2006)
Cortical functioning in children with developmental coordination disorder: a motor overflow study
by: Licari, M., et al.
Published: (2015)
by: Licari, M., et al.
Published: (2015)
Risk based analysis for detention pond overflow at Iskandar Malaysia (Nusajaya), Johor
by: Suif, Zuliziana
Published: (2008)
by: Suif, Zuliziana
Published: (2008)
Polymerizations Mediated by Well-Defined Rhodium Complexes
by: Tan, Nicholas Sheng Loong, et al.
Published: (2020)
by: Tan, Nicholas Sheng Loong, et al.
Published: (2020)
Dynamic control of urban sewer systems to reduce combined sewer overflows and their adverse impacts
by: Rathnayake, U., et al.
Published: (2019)
by: Rathnayake, U., et al.
Published: (2019)
Quantitative assessment on remote code execution vulnerability in web apps
by: Md. Maruf, Hassan, et al.
Published: (2019)
by: Md. Maruf, Hassan, et al.
Published: (2019)
Controlled Polymerisation of Arylacetylenes with Well-Defined Rhodium Catalysts
by: Tan, Nicholas Sheng Loong
Published: (2020)
by: Tan, Nicholas Sheng Loong
Published: (2020)
Exploitation of lichens as a source of novel natural products
by: Witts, Jessica Katherine
Published: (2022)
by: Witts, Jessica Katherine
Published: (2022)
Joint proprietorship and business partnership (‘inan) in Islamic law: an analysis of the defining criteria
by: Sadique, Muhammad Abdurrahman
Published: (2019)
by: Sadique, Muhammad Abdurrahman
Published: (2019)
Relationship lending: A source of support or a means of exploitation?
by: Hussain, I., et al.
Published: (2020)
by: Hussain, I., et al.
Published: (2020)
Synthesis of well-defined iron nanoparticles on a spherical model support
by: N.A., Mohd Zabidi, et al.
Published: (2009)
by: N.A., Mohd Zabidi, et al.
Published: (2009)
Synthesis of Well-defined Iron Nanoparticles on a Spherical Model Support
by: Mohd Zabidi, N. A., et al.
Published: (2009)
by: Mohd Zabidi, N. A., et al.
Published: (2009)
Super-microporous Organosilicas Synthesized from Well-defined Nanobuilding Units
by: Zhang, Lei, et al.
Published: (2008)
by: Zhang, Lei, et al.
Published: (2008)
Population connectivity and the effectiveness of marine protected areas to protect vulnerable, exploited and endemic coral reef fishes at an endemic hotspot
by: van der Meer, M., et al.
Published: (2015)
by: van der Meer, M., et al.
Published: (2015)
Novel Endorna-like viruses, including three with two open reading frames, challenge the membership criteria and taxonomy of the Endornaviridae
by: Ong, J., et al.
Published: (2016)
by: Ong, J., et al.
Published: (2016)
On the full exploitation of symmetry in periodic (as well as molecular) self-consistentfield ab initio calculations
by: Orlando, R., et al.
Published: (2014)
by: Orlando, R., et al.
Published: (2014)
An empirical comparison of commercial and open‐source web vulnerability scanners
by: Amankwah, Richard, et al.
Published: (2020)
by: Amankwah, Richard, et al.
Published: (2020)
International harmonization of approaches to define underwater noise exposure criteria and needs of the international regulatory community
by: Lucke, Klaus, et al.
Published: (2016)
by: Lucke, Klaus, et al.
Published: (2016)
Income poverty and well-being among vulnerable households: a study in Malaysia
by: Ahmad, Nor Fairani, et al.
Published: (2016)
by: Ahmad, Nor Fairani, et al.
Published: (2016)
WELL building: Criteria for residential buildings in a developing country
by: Salma Husna, Zamani, et al.
Published: (2023)
by: Salma Husna, Zamani, et al.
Published: (2023)
Mining stack overflow to recommend Java API classes using word embedding and topic modelling / Lee Wai Keat
by: Lee , Wai Keat
Published: (2019)
by: Lee , Wai Keat
Published: (2019)
Composing Well-Defined Stimulus-Responsive Materials Through Postpolymerization Modification Reactions
by: Roth, Peter
Published: (2014)
by: Roth, Peter
Published: (2014)
The Taxonomy Of CSR In India
by: Kapoor, Anurag
Published: (2003)
by: Kapoor, Anurag
Published: (2003)
Grid-like residential layout: vulnerability to burglary / Saniah Ahmad Zaki
by: Ahmad Zaki, Saniah
Published: (2016)
by: Ahmad Zaki, Saniah
Published: (2016)
Grid-like residential layout: vulnerability to burglary / Saniah Ahmad Zaki
by: Ahmad Zaki, Saniah
Published: (2016)
by: Ahmad Zaki, Saniah
Published: (2016)
Exploitation of low value food materials as a novel source of flavour enhancers
by: Xia, Wei
Published: (2017)
by: Xia, Wei
Published: (2017)
Dynamicuser-defined accesscontrol policies via programming language / Suzana Ahmad
by: Ahmad, Suzana
Published: (2018)
by: Ahmad, Suzana
Published: (2018)
Income poverty status and well-being of the vulnerable households in Malaysia: a comparative study
by: Ahmad, Nor Fairani, et al.
Published: (2012)
by: Ahmad, Nor Fairani, et al.
Published: (2012)
Exceptional longevity, slow growth and late maturation infer high inherent vulnerability to exploitation for bass groper Polyprion americanus (Teleostei: Polyprionidae)
by: Wakefield, Corey, et al.
Published: (2013)
by: Wakefield, Corey, et al.
Published: (2013)
Psychological well being and self care practices of patient with hypertension / Siti Khuzaimah Ahmad Sharoni, Nurul Syakila Naziron, Nurul Ashikin Hamzah, and Siti Rohaida Mohamed
by: Naziron, Nurul Syakila, et al.
Published: (2013)
by: Naziron, Nurul Syakila, et al.
Published: (2013)
Similar Items
-
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches
by: Hazim, Hanif, et al.
Published: (2021) -
Numerical study of irregular wave overtopping and overflow
by: Soliman, Akram S M
Published: (2003) -
Scale effect of storm sewage overflow structure
by: S. Y. Lim ,, et al.
Published: (1990) -
Defining criterias of shariah compliant hotel rooms
by: Saifuddin, Syaza, et al.
Published: (2017) -
Defining criterias of Shariah compliant hotel rooms
by: Saifuddin, Syaza, et al.
Published: (2016)