排序方式: 共有73条查询结果,搜索用时 359 毫秒
1.
Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most existing solutions for avoiding buffer overflows are either inadequate, inefficient or incompatible with existing code. In this paper, we present a novel approach for transparent and efficient runtime protection against buffer overflows. The approach is implemented by two tools: Type Information Extractor and Depositor (TIED) and LibsafePlus. TIED is first used on a binary executable or shared library file to extract type information from the debugging information inserted in the file by the compiler and reinsert it in the file as a data structure available at runtime. LibsafePlus is a shared library that is preloaded when the program is run. LibsafePlus intercepts unsafe C library calls such as strcpy and uses the type information made available by TIED at runtime to determine whether it would be ‘safe’ to carry out the operation. With our simple design we are able to protect most applications with a performance overhead of less than 10%. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
2.
Agrawal Prateek Chaudhary Deepak Madaan Vishu Zabrovskiy Anatoliy Prodan Radu Kimovski Dragi Timmerer Christian 《Multimedia Tools and Applications》2021,80(4):5319-5350
Multimedia Tools and Applications - Automated bank cheque verification using image processing is an attempt to complement the present cheque truncation system, as well as to provide an alternate... 相似文献
3.
The Regular Post Embedding Problem extended with partial (co)directness is shown decidable. This extends to universal and/or counting versions. It is also shown that combining directness and codirectness in Post Embedding problems leads to undecidability. 相似文献
4.
Babani Vikas Charulata Pragya Prateek Arya Rajeev Qamar Shamimul 《Wireless Personal Communications》2022,124(3):2699-2722
Wireless Personal Communications - Water Cycle Algorithm (WCA) is a nature-inspired metaheuristic algorithm. There is a lack of literature surrounding the use of WCA in modern cellular mobile... 相似文献
5.
6.
Pandey Mamta Litoriya Ratnesh Pandey Prateek 《Wireless Personal Communications》2019,107(4):1687-1708
Wireless Personal Communications - Increased dominance of mobile applications (henceforth, app) over conventional software applications is quite apparent; however, there is a lack of structured... 相似文献
7.
This paper represents an efficient bootstrapped analog to digital converter with augmented NMOS sleep transistors. The newly designed MOS-based bootstrapped circuit is implemented to provide controlled input supply for analog to digital converter to develop the enhancing capability of circuit. This will reduce the effective leakage of the circuit. In the second stage, the NMOS sleep transistors are augmented as pull-up and pull-down transistors. Due to augmentation of transistors, controlled power supply ( \(V_{\mathrm{DD}})\) is obtained. Because of this, current driving capability in MOS transistors is improved and minimum sub-threshold leakage current is formed. Due to this, reduction of leakage power dissipation occurs much effectively. The whole simulation has been done at 45 nm (nanometer) technology. It is realized that the leakage power is reduced till 50 % approximately and delay performance is improved. It means that speed is improved using bootstrapped circuit with augmented sleep transistors NMOS. In this paper, different consecutive designs with Analog to Digital converter are represented. 相似文献
8.
Anitha Mogilicharla Prateek Mittal Saptarshi Majumdar 《Materials and Manufacturing Processes》2015,30(4):394-402
Despite the established superiority in finding the global as well as well-spread Pareto optimal (PO) points, the need of more numbers of function evaluations for population based evolutionary optimization techniques leads to a computationally demanding proposal. The case becomes more miserable if the function evaluations are carried out using a first principle based computationally expensive model, making the proposal not fit for online usage of the application. In this work, a Kriging based surrogate model has been proposed to replace a computationally expensive model to save execution time while performing an optimization task. A multi-objective optimization study has been carried out for the bulk vinyl acetate polymerization with long-chain branching using these surrogate as well as expensive models and Kriging PO solutions similar to those found by the first principle models are obtained with a close to 85% savings in function evaluations. 相似文献
9.
Pandey Mamta Litoriya Ratnesh Pandey Prateek 《Wireless Personal Communications》2020,110(4):1659-1677
Wireless Personal Communications - In the current generation of information technology, mobile applications (apps) have become an essential and momentous source to publicize the information across... 相似文献
10.
Nahar Prateek Chaudhari N. S. Tanwani S. K. 《Multimedia Tools and Applications》2022,81(17):24515-24527
Multimedia Tools and Applications - Most solitary finger impression check and acknowledgment frameworks / methods are based on the minutiae feature points. Feature Extraction is a fundamental... 相似文献