Honeywell

Displaying 1-2 of 2 results

  • White Papers // Aug 2009

    An Architecture for Scalable Network Defense

    This paper describes a novel architecture for network defense designed for scaling to very high data rates (100 Gb/s) and very large user populations. Scaling requires both efficient attack detection algorithms as well as appropriate an execution environment. The architecture considers the time budget of traffic data extraction and algorithmic...

    Provided By Honeywell

  • White Papers // Mar 2009

    Steps Involved in Exploiting a Buffer Overflow Vulnerability Using a SEH Handler

    This paper uses buffer overflow vulnerability in an application to overwrite the SEH handler. This paper will outline all the steps necessary to exploit such vulnerability, from detecting the point of buffer overflow in the application, to writing an exploit. The exploit uses an Activex control (XXXXX.dll) having buffer overflow...

    Provided By Honeywell

  • White Papers // Mar 2009

    Steps Involved in Exploiting a Buffer Overflow Vulnerability Using a SEH Handler

    This paper uses buffer overflow vulnerability in an application to overwrite the SEH handler. This paper will outline all the steps necessary to exploit such vulnerability, from detecting the point of buffer overflow in the application, to writing an exploit. The exploit uses an Activex control (XXXXX.dll) having buffer overflow...

    Provided By Honeywell

  • White Papers // Aug 2009

    An Architecture for Scalable Network Defense

    This paper describes a novel architecture for network defense designed for scaling to very high data rates (100 Gb/s) and very large user populations. Scaling requires both efficient attack detection algorithms as well as appropriate an execution environment. The architecture considers the time budget of traffic data extraction and algorithmic...

    Provided By Honeywell