Back to Results
First PageMeta Content
Software engineering / Stack buffer overflow / Buffer overflow protection / Buffer overflow / Stack / C standard library / Setjmp.h / Denial-of-service attack / Write / Software bugs / Computing / Software quality


Design of a secure system Software Security Holes and Defenses u Follows a ring design.
Add to Reading List

Document Date: 2001-03-14 14:43:28


Open Document

File Size: 56,72 KB

Share Result on Facebook

Company

eEye / /

/

IndustryTerm

search core dump / web server / web server crashes / service attacks/tools / Apache web server / /

NaturalFeature

Covert channel / /

OperatingSystem

UNIX / DoS / Solaris / Linux / /

Organization

Department of Defense / Federal Bureau of Investigation / /

Person

Bell-La Padula / Hence / Bell-La Pdula Model / /

Position

Java security manager / General / /

ProgrammingLanguage

Perl / C++ / /

Technology

Cell phones / Perl / Operating System / UDP / DNS / Java / firewall / Linux / web server / ISAPI / /

URL

http /

SocialTag