Essays about: "memory corruption"

Showing result 1 - 5 of 11 essays containing the words memory corruption.

  1. 1. The Efficacy of Forward-Edge Control-Flow Integrity in Mitigating Memory Corruption Vulnerabilities : The Case of the Android Stack

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Viktor Olofsson; [2023]
    Keywords : control-flow integrity; CFI; control-flow graph; CFG; memory corruption; Android; vulnerability; android vulnerability; computer security;

    Abstract : Memory corruption is one of the oldest and most prominent problems in the field of computer security. In order to protect the vulnerabilities that arise from memory corruption, a mitigation technique called Control-flow Integrity (CFI) was developed. READ MORE

  2. 2. The Hare, the Tortoise and the Fox : Extending Anti-Fuzzing

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Anton Dewitz; William Olofsson; [2022]
    Keywords : anti-fuzzing; fuzz testing; benchmarking; coverage-accounting; fuzzing; anti-fuzzning; fuzz-testande; benchmarking; täckningsrapportering; fuzzning;

    Abstract : Background. The goal of our master's thesis is to reduce the effectiveness of fuzzers using coverage accounting. The method we chose to carry out our goal is based on how the coverage accounting in TortoiseFuzz rates code paths to find memory corruption bugs. READ MORE

  3. 3. Detecting Signal Corruptions in Voice Recordings for Speech Therapy

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Helmer Nylén; [2021]
    Keywords : Noise; Classification algorithms; Audio recording; Machine learning; Acoustic signal processing; Störning; Klassificeringsalgoritmer; Ljudinspelning; Maskininlärning; Akustisk signalbehandling;

    Abstract : When recording voice samples from a patient in speech therapy the quality of the recording may be affected by different signal corruptions, for example background noise or clipping. The equipment and expertise required to identify small disturbances are not always present at smaller clinics. READ MORE

  4. 4. Vulnerability assessment of source codeanalysis tools for memory corruptionvulnerabilities a comparative study

    University essay from

    Author : Johan Tejning; [2021]
    Keywords : ;

    Abstract : Background. One of the main reasons for memory corruption vulnerabilities lies in the lack of built in safety measures for the C/C++ programming language which is often time used to develop performance critical software. READ MORE

  5. 5. Do You Swear to Tell the Whole Truths? Tunisia and the Truth and Dignity Commission.

    University essay from Lunds universitet/Graduate School; Lunds universitet/Master of Science in Development Studies

    Author : Elvire Michel; [2019]
    Keywords : Truth and Dignity Commission TDC ; transitional justice TJ ; truth commission TC ; parrhesia; right to the truth; reconciliation; transition; memory; healing; Law and Political Science;

    Abstract : Tunisia is where all hope and rebellion started. After the self-immolation of Mohamed Bouazizi in 2010, the Jasmine Revolution spread to other Arab countries leading to the famous Arab Spring. Tunisia is depicted as the model of democratic transition in the Arab region and in the West. READ MORE