Automated method of building exploites in analysis software testing
A problem with the automated exploit building method for the stack buffer overflow vulnerability. Application of the method to the problem of assessing the severity of errors in software and building protection for software and operating systems.
Подобные документы
Application of an autotyped rasterization method to protect text, table and graphic information. Use of the method in question to protect information on tangible media. Develop a modified amplitude-modulated screening method to improve print quality.
??????, добавлен 28.09.2016Assistive computer programs are one of the most invaluable technologies for people who are blind: category of inclusive software can be effectively utilized for both educational purposes, enabling its users to work with windowed graphical user interfaces.
??????, добавлен 15.09.2020Support Vector Machine (SVM). Optimization problem (mainly Quadratic Programming). Interior Point Method. Mainstream methods to solve Quadratic Programming problem. Incomplete Cholesky factorization and Kronecker factorization. Reform SVM training.
??????, добавлен 30.08.2016The nodes of computer facilities and microprocessor systems. Architecture and software models of Intel microprocessors. Microprocessor systems on universal microprocessors and its programming. Microprocessor systems on microcontrollers and programming.
?????????, добавлен 11.10.2014Automation of the process of keeping a diary and converting it into digital form. Software solutions that allow the user to systematize their hobby experience and find something new for themselves. Evaluation of the functionality of compared systems.
??????, добавлен 19.03.2024The problem of parametric identification of mathematical models of reservoir systems for the porosity and permeability functions of ground rock. A solve the problem based on the gradient projection method with minimization of a squared quality criterion.
??????, добавлен 28.08.2016The main situations and problems that inevitably arise during the work of testing engineers, which can be solved by using mobile applications in the Charles program. Conducting testing of mobile applications on iOS and Android operating systems.
??????, добавлен 08.12.2024The nature and characteristics of distributed operating systems. Characteristic and distinctive features of operating systems real-time. Description, application and purpose multiprocessor operating systems, its role and place in computer security.
???????????, добавлен 25.09.2016An overview of the most popular approaches to the modeling of automated systems for intelligent monitoring and management of environmental safety in the water sector. Principles of construction of adaptive systems of this class and requirements to them.
??????, добавлен 30.04.2018???????????? ???????? ?????? Building information modeling, ?????? ???????????? ??????? ??????? ??? ???????? ?? ????? ??????????. ?????????????? ?????? ? ????????? ??????????? Building information modeling, ?????????????? ?? ????????????? ????????.
??????, добавлен 29.07.2017The regression models of software project duration based on project effort. Equations of confidence interval of a non-linear regression model of software project duration based on Johnson transformation for the personal computer development platform.
??????, добавлен 22.03.2016Methods of traversal of high-level multi-threaded models formalized in the Use Case Map computer language. Advantages and disadvantages of this approach compared to existing ones. Generation character lines that are used to test software systems.
??????, добавлен 28.02.2016Definition of the concept "?ybercrime". Analysis of history and cyber threat evolution. Study of the types of cybercrime. Characteristic of hacking, denial of service attack, virus dissemination, computer vandalism, cyber terrorism and software piracy.
???????????, добавлен 24.01.2017??????? ?? ????????????? ???????????? ???????. ????? ?????????? ? ??????????? ??????????? ?????????? ? ??????? "software" ? "hardware". ????? ????????????????? ?????????????? ??????????? ? ??????????? ? ?????????????? ?????????? ????????????????.
???????, добавлен 18.11.2013The opportunities that create application of computer visualization using mathematical software to improve the quality of interactive teaching of students. Visualization of numerical solution of problems of mathematical physics by finite element method.
??????, добавлен 20.01.2016- 66. Development of an advanced SS platform based on the OAuth2 protocol for unified system authorization
Examination of the significance of authentication and authorization in Software as a Service platforms, with a specific focus on the OAuth2 protocol. Analysis of potential vulnerabilities, complexities, and the ever-evolving nature of the protocol.
??????, добавлен 08.12.2024 On relevance of technical analysis. Pattern recognition. Technical indicators. Data processing. Feature extraction. Kolmogorov-Smirnov test. Algorithm and software. Model configuration. Clustering performance on simulated data, brut? force algorithm.
??????? ???????, добавлен 26.08.2016The structure chart of identification using n-th order volterra model in frequency domain using interpolation method. Numerical values of identification accuracy. The simulink model of the test system with noise generator, osillosopes. Wavelet function.
??????, добавлен 28.08.2016Analysis of the influence of information processes on the development of the state. The use of computer technology in the banking sector. Development of an automated terminal monitoring system and a database management system. Thin client functions.
??????, добавлен 26.01.2021Methods, tools and applications of Data Mining. Basic concepts of data warehouses and the place of Data Mining in their architecture. The process of data analysis using this technology, its stages. Analytical software market, product data capabilities.
??????, добавлен 30.10.2020The study of the sequence of stages of reconstruction of graphical images on a computer using decoding dual vectors of the tuple. Decoding code values in software components. Ways of coding information. Methods of the decrypting computer codes cost.
??????, добавлен 25.03.2016??????????, ??????? ?????????? ? ??????????? ????????? Consistent Software ElectriCS 3D. ?????????????????? ????????? ??????? ?????????? ?????????? ??? ??????????????, ?????????????, ???????????? ?????? ? ???????? ??????????. ???? ????????? ??????????.
???????, добавлен 24.02.2013Development of new ways to ensure the security of data transmission through telecommunication networks. Hardware protection of information from unauthorized access. Organization of hidden channels of common use. The method of authentication of images.
??????, добавлен 29.11.2016Development of a new complex oscillator for effective algorithmic trading in the stock market. Technical indicators on which the oscillator is based and the rule base for its construction. Oscillator calculation algorithm using QuantOffice software.
??????, добавлен 09.08.2022???????????? ???????????? ?????????? ??????? ????????? ???????? ??? ????????? ???????????? ?? ???????????. ??????????? ????????????? ???????? ???????? ???????????. ???????????? ? ?????????????? ???????? ?????? ????? ????? ?????? software engineering.
??????, добавлен 09.10.2022
