2002
DOI: 10.6028/nist.sp.800-40
|View full text |Cite
|
Sign up to set email alerts
|

Procedures for handling security patches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2004
2004
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…They occur when a programmer implements incorrect bound checks on buffer size or even fails to do bounds checking where data is written into a fixed length buffer [12]. By definition buffer overflow is similar to boundary overflow, which is an input error and occurs when values are entered that violate the range of values.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They occur when a programmer implements incorrect bound checks on buffer size or even fails to do bounds checking where data is written into a fixed length buffer [12]. By definition buffer overflow is similar to boundary overflow, which is an input error and occurs when values are entered that violate the range of values.…”
Section: Related Workmentioning
confidence: 99%
“…The outputs considerably differ from the ones in Table 4. In erroneous cases (1)(2)(3)(4)(5)(6)(7)(8)(9)(10)(11)(12)(13)(14)(15)(16)(17)(18)(19), the software outputs the right error message and aborts sending the packets.…”
Section: F F F F F F T T T T T T T T T T T T T T T T T T 2 Min <= 655mentioning
confidence: 99%
“…A vulnerability is characterized as a "Boundary overflow" when the input being received by a system causes the system to exceed an assumed boundary resulting in a vulnerability [9]. Instead of inserting dynamic checks into the generated code as in [15], our approach uses static control condition insertion into the source code to avoid boundary overflow in advance.…”
Section: Boundary Overflow Vulnerability Detectionmentioning
confidence: 99%
“…In certain cases (2,3,6,8,9,11,12), the corresponding error is a Type II error (false negative). In these cases, there are faulty input pairs that are out of boundary values but the program behaves as they are not faulty.…”
Section: F F F F T T T T T T T T T T Min <= 65535 T T T T T F F F F Fmentioning
confidence: 99%
See 1 more Smart Citation