text
stringlengths
11
320k
source
stringlengths
26
161
Riskware, aportmanteauofriskandsoftware, is a word used to describe software whoseinstallationandexecutionposes a potential risk to ahost computer. Relatively normal programs can often fall into the category of riskware as someapplicationscan be modified for another purpose and used against the computeruseror owner.[1]...
https://en.wikipedia.org/wiki/Riskware
Aweb application(orweb app) isapplication softwarethat is created withweb technologiesand runs via aweb browser.[1][2]Web applications emerged during the late 1990s and allowed for the server todynamicallybuild a response to the request, in contrast tostatic web pages.[3] Web applications are commonly distributed via ...
https://en.wikipedia.org/wiki/Web_application#Development
In the context ofinformation security,social engineeringis the use of psychological influence of people into performing actions or divulgingconfidential information. This differs frompsychological manipulationin that it doesn't need to be controlling, negative or a one-way transaction. Manipulation involves azero-sum g...
https://en.wikipedia.org/wiki/Social_engineering_(security)
Targeted threatsare a class ofmalwaredestined for one specific organization or industry. A type of crimeware, thesethreatsare of particular concern because they are designed to capture sensitive information. Targeted attacks may include threats delivered via SMTP e-mail, port attacks,zero day attackvulnerabilityexplo...
https://en.wikipedia.org/wiki/Targeted_threat
Atechnical support scam, ortech support scam, is a type ofscamin which a scammer claims to offer a legitimatetechnical supportservice. Victims contact scammers in a variety of ways, often through fakepop-upsresemblingerror messagesor via fake "help lines" advertised onwebsitesowned by the scammers. Technical support sc...
https://en.wikipedia.org/wiki/Technical_support_scam
Telemetryis thein situcollection of measurementsor other data at remote points and their automatictransmissionto receiving equipment (telecommunication) for monitoring.[1]The word is derived from theGreekrootstele, 'far off', andmetron, 'measure'. Systems that need external instructions and data to operate require the ...
https://en.wikipedia.org/wiki/Telemetry#Software
Typosquatting, also calledURL hijacking, asting site, acousin domain, or afake URL, is a form ofcybersquatting, and possiblybrandjackingwhich relies on mistakes such astyposmade by Internet users when inputting awebsite addressinto aweb browser. A user accidentally entering an incorrect website address may be led to an...
https://en.wikipedia.org/wiki/Typosquatting
Aweb serveriscomputersoftwareand underlyinghardwarethat accepts requests viaHTTP(thenetwork protocolcreated to distributeweb content) or its secure variantHTTPS. A user agent, commonly aweb browserorweb crawler, initiates communication by making a request for aweb pageor otherresourceusing HTTP, and theserverresponds w...
https://en.wikipedia.org/wiki/Web_server#Causes_of_overload
Webattackeris a do-it-yourselfmalwarecreation kit that includesscriptsthat simplify the task of infecting computers andspam-sending techniques to lure victims to specially riggedWebsites. It was allegedly created by a group ofRussianprogrammers. The kit demands minimal technical sophistication to be manipulated and use...
https://en.wikipedia.org/wiki/Webattacker
Incomputing, azombieis a computer connected to the Internet that has beencompromisedby ahackervia acomputer virus,computer worm, ortrojan horseprogram and can be used to perform malicious tasks under the remote direction of the hacker. Zombie computers often coordinate together in abotnetcontrolled by the hacker, and ...
https://en.wikipedia.org/wiki/Zombie_(computer_science)
TheUnixandLinuxaccess rights flagssetuidandsetgid(short forset user identityandset group identity)[1]allow users to run anexecutablewith thefile system permissionsof the executable's owner or group respectively and to change behaviour in directories. They are often used to allow users on a computer system to run progra...
https://en.wikipedia.org/wiki/Setuid
Ambient authorityis a term used in the study ofaccess controlsystems. A subject, such as a computer program, is said to be usingambient authorityif it only needs to specify the names of the involved object(s) and the operation to be performed on them in order for a permitted action to succeed.[1][2][3] In this defini...
https://en.wikipedia.org/wiki/Ambient_authority
TheCommon Vulnerabilities and Exposures(CVE) system, originallyCommon Vulnerability Enumeration,[1]provides a reference method for publicly knowninformation-securityvulnerabilitiesand exposures.[2]The United States'Homeland Security Systems Engineering and Development Institute FFRDC, operated byThe MITRE Corporation, ...
https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures
Link rot(also calledlink death,link breaking, orreference rot) is the phenomenon ofhyperlinkstending over time to cease to point to their originally targetedfile,web page, orserverdue to that resource being relocated to a new address or becoming permanently unavailable. A link that no longer points to its target may be...
https://en.wikipedia.org/wiki/Link_rot
Amemory debuggeris adebuggerfor finding software memory problems such asmemory leaksandbuffer overflows. These are due tobugsrelated to the allocation and deallocation ofdynamic memory. Programs written in languages that havegarbage collection, such asmanaged code, might also need memory debuggers, e.g. for memory lea...
https://en.wikipedia.org/wiki/Memory_debugger
Incomputer programming, awild branchis aGOTOinstruction where the target address is indeterminate, random or otherwise unintended.[1]It is usually the result of asoftware bugcausing the accidental corruption of apointerorarray index. It is "wild" in the sense that it cannot be predicted to behave consistently. In other...
https://en.wikipedia.org/wiki/Wild_branch
Incomputer programming, the termhookingcovers a range of techniques used to alter or augment the behaviour of anoperating system, ofapplications, or of other software components by interceptingfunction callsormessagesoreventspassed betweensoftware components. Code that handles such intercepted function calls, events or...
https://en.wikipedia.org/wiki/Hooking
Aninstruction set simulator(ISS) is asimulationmodel, usually coded in ahigh-level programming language, which mimics the behavior of a mainframe ormicroprocessorby "reading" instructions and maintaining internal variables which represent the processor'sregisters. Instruction simulationis a methodology employed for on...
https://en.wikipedia.org/wiki/Instruction_set_simulator
Software analyticsis theanalyticsspecific to the domain ofsoftware systemstaking into accountsource code, static and dynamic characteristics (e.g.,software metrics) as well as related processes of theirdevelopmentandevolution. It aims at describing, monitoring, predicting, and improving the efficiency and effectiveness...
https://en.wikipedia.org/wiki/Runtime_intelligence
Managed servicesis the practice of outsourcing the responsibility for maintaining, and anticipating need for, a range of processes and functions, ostensibly for the purpose of improved operations and reduced budgetary expenditures through the reduction of directly-employed staff.[1][2][3]It is an alternative to thebrea...
https://en.wikipedia.org/wiki/Managed_services
Insoftware engineering,profiling(program profiling,software profiling) is a form ofdynamic program analysisthat measures, for example, the space (memory) or timecomplexity of a program, theusage of particular instructions, or the frequency and duration of function calls. Most commonly, profiling information serves to ...
https://en.wikipedia.org/wiki/Software_performance_analysis
Incomputers,hardware performance counters(HPCs),[1]orhardware countersare a set of special-purposeregistersbuilt into modernmicroprocessorsto store the counts of hardware-related activities. Advanced users often rely on those counters to conduct low-levelperformance analysisortuning. The number of available hardware c...
https://en.wikipedia.org/wiki/Hardware_performance_counter
DTraceis a comprehensive dynamictracingframework originally created bySun Microsystemsfortroubleshootingkerneland application problems on production systems in real time. Originally developed forSolaris, it has since been released under the freeCommon Development and Distribution License(CDDL) inOpenSolarisand its des...
https://en.wikipedia.org/wiki/DTrace
Oracle Solarisis aproprietaryUnixoperating systemoffered byOracleforSPARCandx86-64basedworkstationsandservers. Originally developed bySun Microsystemsas Solaris, it superseded the company's earlierSunOSin 1993 and became known for itsscalability, especially on SPARC systems, and for originating many innovative features...
https://en.wikipedia.org/wiki/Solaris_(operating_system)
macOS, previouslyOS Xand originallyMac OS X, is aUnix-based[6][7]operating systemdeveloped and marketed byApplesince 2001. It is the current operating system for Apple'sMac computers. Within the market ofdesktopandlaptopcomputers, it is thesecond most widely used desktop OS, afterMicrosoft Windowsand ahead of allLinuxd...
https://en.wikipedia.org/wiki/MacOS
FreeBSDis afree-softwareUnix-likeoperating systemdescended from theBerkeley Software Distribution(BSD). The first version was released in 1993 developed from386BSD[4], one of the first fully functional and freeUnixclones on affordable home-class hardware, and has since continuously been the most commonly used BSD-deriv...
https://en.wikipedia.org/wiki/FreeBSD
Java Management Extensions(JMX) is aJavatechnology that supplies tools for managing and monitoringapplications, system objects, devices (such asprinters) and service-oriented networks. Those resources are represented by objects called MBeans (forManaged Bean). In the API,classescan be dynamically loaded and instantiate...
https://en.wikipedia.org/wiki/Java_Management_Extensions
Application Response Measurement(ARM) is an open standard published by theOpen Groupfor monitoring and diagnosing performance bottlenecks within complex enterprise applications that useloosely-coupleddesigns orservice-oriented architectures. It includes anAPIforCandJavathat allows timing information associated with ea...
https://en.wikipedia.org/wiki/Application_Response_Measurement
Anapplication programming interface(API) is a connection betweencomputersor betweencomputer programs. It is a type of softwareinterface, offering a service to other pieces ofsoftware.[1]A document or standard that describes how to build such a connection or interface is called anAPI specification. A computer system tha...
https://en.wikipedia.org/wiki/Application_programming_interface
C(pronounced/ˈsiː/– like the letterc)[6]is ageneral-purpose programming language. It was created in the 1970s byDennis Ritchieand remains very widely used and influential. By design, C's features cleanly reflect the capabilities of the targetedCPUs. It has found lasting use inoperating systemscode (especially inkernels...
https://en.wikipedia.org/wiki/C_(programming_language)
Javais ahigh-level,general-purpose,memory-safe,object-orientedprogramming language. It is intended to letprogrammerswrite once, run anywhere(WORA),[18]meaning thatcompiledJava code can run on all platforms that support Java without the need to recompile.[19]Java applications are typically compiled tobytecodethat can ru...
https://en.wikipedia.org/wiki/Java_(programming_language)
Incomputer science,dynamic recompilationis a feature of someemulatorsandvirtual machines, where the system mayrecompilesome part of aprogramduring execution. By compiling during execution, the system can tailor the generated code to reflect the program's run-time environment, and potentially produce more efficientcodeb...
https://en.wikipedia.org/wiki/Dynamic_recompilation
Incomputing,data validationorinput validationis the process of ensuringdatahas undergonedata cleansingto confirm it hasdata quality, that is, that it is both correct and useful. It uses routines, often called "validation rules", "validation constraints", or "check routines", that check for correctness, meaningfulness, ...
https://en.wikipedia.org/wiki/Data_validation
Cross-browser testingis a type of non-functionalsoftware testingwhereweb applicationsare checked for support across different browsers and devices. Cross-browser testing can also provide an objective, independent view of the status of the web application to allow the business to appreciate and understand the risks of r...
https://en.wikipedia.org/wiki/Cross-browser_testing
Database testingusually consists of a layered process, including theuser interface(UI) layer, the business layer, the data access layer and the database itself. The UI layer deals with the interface design of the database, while the business layer includes databases supportingbusiness strategies. Databases, the collec...
https://en.wikipedia.org/wiki/Database_testing
Domain testingis asoftware testingtechnique that involves selecting a small number of test cases from a nearly infinite group of candidate test cases. It is one of the most widely practiced software testing techniques.Domain knowledgeplays a very critical role while testing domain-specific work.[1][2][3][4][5][6][7] T...
https://en.wikipedia.org/wiki/Domain_testing
Dynamic program analysisis the act ofanalyzing softwarethat involves executing aprogram– as opposed tostatic program analysis, which does not execute it. Analysis can focus on different aspects of the software including but not limited to:behavior,test coverage,performanceandsecurity. To be effective, the target prog...
https://en.wikipedia.org/wiki/Dynamic_program_analysis
Insoftware engineering,graphical user interface testingis the process oftestinga product'sgraphical user interface(GUI) to ensure it meets its specifications. This is normally done through the use of a variety oftest cases. To generate a set oftest cases,test designersattempt to cover all the functionality of the sys...
https://en.wikipedia.org/wiki/Graphical_user_interface_testing
Anindependent test organizationis an organization, person, or company that tests products, materials, software, etc. according to agreed requirements. The test organization can be affiliated with the government or universities or can be anindependent testing laboratory. They are independent because they are not affil...
https://en.wikipedia.org/wiki/Independent_test_organization
Manual testingis the process of manuallytesting softwarefor defects. It requires a tester to play the role of an end user where by they use most of the application's features to ensure correct behaviour. To guarantee completeness of testing, the tester often follows a writtentest planthat leads them through a set of im...
https://en.wikipedia.org/wiki/Manual_testing
Orthogonal array testingis a systematic andstatistically-drivenblack-box testingtechnique employed in the field ofsoftware testing.[1][2]This method is particularly valuable in scenarios where the number of inputs to asystemis substantial enough to make exhaustive testing impractical. Orthogonal array testing works on...
https://en.wikipedia.org/wiki/Orthogonal_array_testing
Pair testingis asoftware developmenttechnique in which two team members work together at one keyboard to test thesoftware application. One does the testing and the other analyzes or reviews the testing. This can be done between onetesteranddeveloperorbusiness analystor between two testers with both participants takin...
https://en.wikipedia.org/wiki/Pair_testing
Reverse semantic traceability(RST) is aquality controlmethod for verification improvement that helps to insure high quality ofartifactsby backward translation at each stage of thesoftware development process. Each stage of development process can be treated as a series of “translations” from one language to another. A...
https://en.wikipedia.org/wiki/Reverse_semantic_traceability
This article discusses a set of tactics useful insoftware testing. It is intended as a comprehensive list of tactical approaches tosoftware quality assurance(more widely colloquially known asquality assurance(traditionally called by the acronym "QA")) and general application of thetest method(usually just called "testi...
https://en.wikipedia.org/wiki/Software_testing_tactics
Test management toolsare used to store information on how testing is to be done, plan testing activities and report the status of quality assurance activities. The tools have different approaches to testing and thus have different sets of features. Generally they are used to maintain and plan manual testing, run or gat...
https://en.wikipedia.org/wiki/Test_management_tool
Atrace tableis a technique used to test algorithms in order to make sure that no logical errors occur while thecalculationsare being processed. The table usually takes the form of a multi-column, multi-row table; With each column showing avariable, and each row showing each number input into the algorithm and the subse...
https://en.wikipedia.org/wiki/Trace_table
Web testingissoftware testingthat focuses onweb applications. Complete testing of a web-based system before going live can help address issues before the system is revealed to the public. Issues may include the security of the web application, the basic functionality of the site, its accessibility to disabled and fully...
https://en.wikipedia.org/wiki/Web_testing
Incomputer science,abstract interpretationis a theory ofsound approximationof thesemantics of computer programs, based onmonotonic functionsoverordered sets, especiallylattices. It can be viewed as a partialexecutionof acomputer programwhich gains information about its semantics (e.g.,control-flow,data-flow) without pe...
https://en.wikipedia.org/wiki/Abstract_interpretation
In computer science, asimulationis a computation of the execution of some appropriately modelledstate-transition system. Typically this process models the complete state of the system at individual points in a discrete linear time frame, computing each state sequentially from its predecessor. Models for computer progra...
https://en.wikipedia.org/wiki/Symbolic_simulation
Inmathematicsandcomputer science,[1]computer algebra, also calledsymbolic computationoralgebraic computation, is a scientific area that refers to the study and development ofalgorithmsandsoftwarefor manipulatingmathematical expressionsand othermathematical objects. Although computer algebra could be considered a subfie...
https://en.wikipedia.org/wiki/Symbolic_computation
Incomputer science, acontrol-flow graph(CFG) is arepresentation, usinggraphnotation, of all paths that might be traversed through aprogramduring itsexecution. The control-flow graph was conceived byFrances E. Allen,[1]who noted thatReese T. Prosserusedboolean connectivity matricesfor flow analysis before.[2] The CFG i...
https://en.wikipedia.org/wiki/Control-flow_graph
American Fuzzy Lop(AFL), stylized inall lowercaseasamerican fuzzy lop, is afree softwarefuzzerthat employsgenetic algorithmsin order to efficiently increasecode coverageof thetest cases. So far it has detected hundreds of significantsoftware bugsin major free software projects, includingX.Org Server,[2]PHP,[3]OpenSSL,[...
https://en.wikipedia.org/wiki/American_fuzzy_lop_(fuzzer)
Aglitchis a short-livedtechnical fault, such as a transient one that corrects itself, making it difficult to troubleshoot. The term is particularly common in thecomputingandelectronicsindustries, incircuit bending, as well as among players ofvideo games. More generally, all types of systems including humanorganizations...
https://en.wikipedia.org/wiki/Glitch
Aglitchis a short-livedtechnical fault, such as a transient one that corrects itself, making it difficult to troubleshoot. The term is particularly common in thecomputingandelectronicsindustries, incircuit bending, as well as among players ofvideo games. More generally, all types of systems including humanorganizations...
https://en.wikipedia.org/wiki/Glitching
Insoftware testing,monkey testingis a technique where the user tests the application or system by providingrandominputs and checking the behavior, or seeing whether the application or system will crash. Monkey testing is usually implemented as random, automatedunit tests. While the source of the name "monkey" is uncer...
https://en.wikipedia.org/wiki/Monkey_testing
Random testingis a black-boxsoftware testingtechnique where programs are tested bygeneratingrandom, independent inputs. Results of the output are compared against software specifications to verify that the test output is pass or fail.[1]In case of absence of specifications the exceptions of the language are used which ...
https://en.wikipedia.org/wiki/Random_testing
Incomputer security,coordinated vulnerability disclosure(CVD, sometimes known asresponsible disclosure)[1]is avulnerability disclosuremodel in which a vulnerability or an issue is disclosed to the public only after the responsible parties have been allowed sufficient time topatchor remedy the vulnerability or issue.[2]...
https://en.wikipedia.org/wiki/Coordinated_vulnerability_disclosure
Runtime error detectionis asoftware verificationmethod that analyzes a software application as it executes and reportsdefectsthat are detected during that execution. It can be applied duringunit testing,component testing,integration testing,system testing(automated/scripted or manual), orpenetration testing. Runtime e...
https://en.wikipedia.org/wiki/Runtime_error_detection
Security testingis a process intended to detect flaws in thesecuritymechanisms of aninformation systemand as such help enable it to protect data and maintain functionality as intended.[1]Due to the logical limitations of security testing, passing the security testing process is not an indication that no flaws exist or ...
https://en.wikipedia.org/wiki/Security_testing
Incomputer programmingandsoftware testing,smoke testing(alsoconfidence testing,sanity testing,[1]build verification test(BVT)[2][3][4]andbuild acceptance test) is preliminary testing orsanity testingto reveal simple failures severe enough to, for example, reject a prospective software release. Smoke tests are a subset ...
https://en.wikipedia.org/wiki/Smoke_testing_(software)
System testing, a.k.a.end-to-end (E2E) testing, is testing conducted on a completesoftware system. System testing describes testing at the system level to contrast to testing at thesystem integration,integrationorunitlevel. System testing often serves the purpose of evaluating the system's compliance with its specifi...
https://en.wikipedia.org/wiki/System_testing
Insoftware testing,test automationis the use ofsoftwareseparate from the software being tested to control the execution of tests and the comparison of actual outcomes with predicted outcomes.[1]Test automation can automate some repetitive but necessary tasks in a formalized testing process already in place, or perform ...
https://en.wikipedia.org/wiki/Test_automation
AnABX testis a method of comparing two choices of sensory stimuli to identify detectable differences between them. A subject is presented with two known samples (sampleA, the first reference, and sampleB, the second reference) followed by one unknown sampleXthat is randomly selected from either A or B. The subject is t...
https://en.wikipedia.org/wiki/ABX_test
Inengineeringand its varioussubdisciplines,acceptance testingis a test conducted to determine if the requirements of aspecificationorcontractare met. It may involvechemical tests,physical tests, orperformance tests.[1] Insystems engineering, it may involveblack-box testingperformed on asystem(for example: a piece ofso...
https://en.wikipedia.org/wiki/Acceptance_testing
In ablindorblinded experiment, information which may influence the participants of theexperimentis withheld until after the experiment is complete. Good blinding can reduce or eliminate experimentalbiasesthat arise from a participants' expectations,observer's effect on the participants,observer bias,confirmation bias, ...
https://en.wikipedia.org/wiki/Blind_experiment
Anedge caseis a problem or situation that occurs only at an extreme (maximum or minimum) operatingparameter. For example, a stereo speaker might noticeably distort audio when played at maximum volume, even in the absence of any other extreme setting or condition. An edge case can be expected or unexpected. Inengineeri...
https://en.wikipedia.org/wiki/Boundary_testing
Asanity checkorsanity testis a basic test to quickly evaluate whether a claim or the result of a calculation can possibly be true. It is a simple check to see if the produced material is rational (that the material's creator was thinking rationally, applyingsanity). The point of a sanity test is to rule out certain cla...
https://en.wikipedia.org/wiki/Sanity_testing
In software quality assurance,performance testingis in general a testing practice performed to determine how a system performs in terms of responsiveness and stability under a particular workload.[1]It can also serve to investigate, measure, validate or verify other quality attributes of the system, such as scalability...
https://en.wikipedia.org/wiki/Software_performance_testing
Stress testingis a form of deliberately intense or thorough testing, used to determine the stability of a given system, critical infrastructure or entity. It involves testing beyond normal operational capacity, often to a breaking point, in order to observe the results. Reasons can include: Reliability engineersoften...
https://en.wikipedia.org/wiki/Stress_testing
Unit testing,a.k.a.componentormoduletesting, is a form ofsoftware testingby which isolatedsource codeis tested to validate expected behavior.[1] Unit testing describes tests that are run at the unit-level to contrast testing at theintegrationorsystemlevel. Unit testing, as a principle for testing separately smaller p...
https://en.wikipedia.org/wiki/Unit_testing
Dynamic application security testing(DAST) represents a non-functional testing process to identify security weaknesses and vulnerabilities in an application. This testing process can be carried out either manually or by using automated tools. Manual assessment of an application involves human intervention to identify t...
https://en.wikipedia.org/wiki/Web_application_security_scanner
White-box testing(also known asclear box testing,glass box testing,transparent box testing, andstructural testing) is a method ofsoftware testingthat tests internal structures or workings of an application, as opposed to its functionality (i.e. black-box testing). In white-box testing, an internal perspective of the sy...
https://en.wikipedia.org/wiki/White-box_testing
Inmathematics,statistics, andcomputational modelling, agrey box model[1][2][3][4]combines a partial theoretical structure with data to complete the model. The theoretical structure may vary from information on the smoothness of results, to models that need only parameter values from data or existing literature.[5]Thus,...
https://en.wikipedia.org/wiki/Grey_box_model
Inmathematics,extrapolationis a type ofestimation, beyond the original observation range, of the value of a variable on the basis of its relationship with another variable. It is similar tointerpolation, which produces estimates between known observations, but extrapolation is subject to greateruncertaintyand a higher ...
https://en.wikipedia.org/wiki/Extrapolation
Incomputer science,static program analysis(also known asstatic analysisorstatic simulation) is theanalysisof computer programs performed without executing them, in contrast withdynamic program analysis, which is performed on programs during their execution in the integrated environment.[1][2] The term is usually appli...
https://en.wikipedia.org/wiki/Static_program_analysis
Dynamic scoringis a forecasting technique forgovernment revenues, expenditures, andbudget deficitsthat incorporates predictions about the behavior of people and organizations based on changes infiscal policy, usuallytax rates. Dynamic scoring depends on models of the behavior ofeconomic agentswhich predict how they wou...
https://en.wikipedia.org/wiki/Dynamic_scoring
Ineconomics, theLaffer curveillustrates a theoretical relationship betweenratesoftaxationand the resulting levels of the government'stax revenue. The Laffer curve assumes that no tax revenue is raised at the extreme tax rates of 0% and 100%, meaning that there is a tax rate between 0% and 100% that maximizes government...
https://en.wikipedia.org/wiki/Laffer_curve
Incomputer security, abillion laughs attackis a type ofdenial-of-service (DoS) attackwhich is aimed atparsersofXMLdocuments.[1] It is also referred to as anXML bombor as an exponential entity expansion attack.[2] The example attack consists of defining 10 entities, each defined as consisting of 10 of the previous ent...
https://en.wikipedia.org/wiki/Billion_laughs
Incomputer securityandprogramming, abuffer over-read[1][2]orout-of-bounds read[3]is ananomalywhere aprogram, while readingdatafrom abuffer, overruns the buffer's boundary and reads (or tries to read) adjacent memory. This is a special case of violation ofmemory safety. Buffer over-reads can be triggered, as in theHea...
https://en.wikipedia.org/wiki/Buffer_over-read
Coding conventionsare a set of guidelines for a specificprogramming languagethat recommendprogramming style, practices, and methods for each aspect of a program written in that language. These conventions usually cover file organization,indentation,comments,declarations,statements,white space,naming conventions,program...
https://en.wikipedia.org/wiki/Coding_conventions
Incomputing,end-of-file(EOF)[1]is a condition in a computeroperating systemwhere no more data can be read from a data source. The data source is usually called afileorstream. In theC standard library, the character-reading functions such asgetcharreturn a value equal to the symbolic value (macro)EOFto indicate that an...
https://en.wikipedia.org/wiki/End-of-file
Aping of deathis a type of attack on a computer system that involves sending amalformedor otherwise maliciouspingto a computer.[1]In this attack, a host sends hundreds of ping requests with a packet size that is large or illegal to another host to try to take it offline or to keep it preoccupied responding withICMP Ech...
https://en.wikipedia.org/wiki/Ping_of_death
Aport scanneris an application designed to probe aserverorhostfor openports. Such an application may be used byadministratorsto verifysecuritypolicies of theirnetworksand byattackersto identifynetwork servicesrunning on a host and exploit vulnerabilities. Aport scanorportscanis a process that sends client requests to ...
https://en.wikipedia.org/wiki/Port_scanner
A"return-to-libc" attackis acomputer securityattack usually starting with abuffer overflowin which a subroutinereturn addresson acall stackis replaced by an address of a subroutine that is already present in theprocessexecutable memory, bypassing theno-execute bitfeature (if present) and ridding the attacker of the nee...
https://en.wikipedia.org/wiki/Return-to-libc_attack
Asafety-critical system[2]orlife-critical systemis a system whose failure or malfunction may result in one (or more) of the following outcomes:[3][4] Asafety-related system(or sometimessafety-involved system) comprises everything (hardware, software, and human aspects) needed to perform one or more safety functions, i...
https://en.wikipedia.org/wiki/Safety-critical_system
This is a list ofoperating systemsspecifically focused onsecurity. Similar concepts includesecurity-evaluated operating systemsthat have achieved certification from anauditingorganization, andtrusted operating systemsthat provide sufficient support formultilevel securityand evidence ofcorrectnessto meet a particular se...
https://en.wikipedia.org/wiki/Security-focused_operating_system
Incomputer science,self-modifying code(SMCorSMoC) iscodethat alters its owninstructionswhile it isexecuting– usually to reduce theinstruction path lengthand improveperformanceor simply to reduce otherwiserepetitively similar code, thus simplifyingmaintenance. The term is usually only applied to code where the self-modi...
https://en.wikipedia.org/wiki/Self-modifying_code
In the context ofsoftware engineering,software qualityrefers to two related but distinct notions:[citation needed] Many aspects of structural quality can be evaluated onlystaticallythrough the analysis of the software's inner structure, its source code (seeSoftware metrics),[3]at the unit level, and at the system leve...
https://en.wikipedia.org/wiki/Software_quality
Blind return-oriented programming(BROP) is an exploit technique which can successfully create an exploit even if the attacker does not possess the target binary. BROP attacks shown by Bittau et al. have defeatedaddress space layout randomization(ASLR) andstack canarieson 64-bit systems. With the current improvements i...
https://en.wikipedia.org/wiki/Blind_return_oriented_programming
JIT sprayingis a class ofcomputer security exploitthat circumvents the protection ofaddress space layout randomizationanddata execution preventionby exploiting the behavior ofjust-in-time compilation.[1]It has been used to exploit thePDFformat[2]andAdobe Flash.[3] Ajust-in-time compiler(JIT) by definition produces cod...
https://en.wikipedia.org/wiki/JIT_spraying
Sigreturn-oriented programming(SROP) is acomputer security exploittechnique that allows an attacker to execute code in presence of security measures such asnon-executable memoryand code signing.[1]It was presented for the first time at the 35thIEEE Symposium on Security and Privacyin 2014 where it won thebest student p...
https://en.wikipedia.org/wiki/Sigreturn-oriented_programming
Incomputer science,threaded codeis a programming technique where thecodehas a form that essentially consists entirely of calls tosubroutines. It is often used incompilers, which may generate code in that form or be implemented in that form themselves. The code may be processed by aninterpreteror it may simply be a sequ...
https://en.wikipedia.org/wiki/Threaded_code
Cross-application scripting(CAS) is a vulnerability affecting desktop applications that don't check input in an exhaustive way. CAS allows an attacker to insert data that modifies the behaviour of a particular desktop application. This makes it possible to extract data from inside of the users' systems. Attackers may g...
https://en.wikipedia.org/wiki/Cross-application_scripting
Cross-site scripting(XSS)[a]is a type of securityvulnerabilitythat can be found in someweb applications. XSS attacks enable attackers toinjectclient-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypassaccess controlssuch as thesame-origin policy. Dur...
https://en.wikipedia.org/wiki/Cross-site_scripting
printfis aC standard libraryfunctionthatformatstextand writes it tostandard output. The function accepts a formatc-stringargumentand avariablenumber of value arguments that the functionserializesper the format string. Mismatch between the format specifiers and count andtypeof values results inundefined behaviorand poss...
https://en.wikipedia.org/wiki/Printf
scanf, short for scan formatted, is aCstandard libraryfunctionthat reads andparsestext fromstandard input. The function accepts a format string parameter that specifies the layout of inputtext. The function parses input text and loads values into variables based ondata type. Similar functions, with other names, preda...
https://en.wikipedia.org/wiki/Scanf
Incomputing,syslog(/ˈsɪslɒɡ/) is a standard formessage logging. It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. Each message is labeled with a facility code, indicating the type of system generating the message, and is assigned ...
https://en.wikipedia.org/wiki/Syslog
Improper input validation[1]orunchecked user inputis a type ofvulnerabilityincomputer softwarethat may be used forsecurity exploits.[2]This vulnerability is caused when "[t]he product does not validate or incorrectly validates input that can affect the control flow or data flow of a program."[1] Examples include: Thi...
https://en.wikipedia.org/wiki/Improper_input_validation
Incomputer science, atype punningis any programming technique that subverts or circumvents thetype systemof aprogramming languagein order to achieve an effect that would be difficult or impossible to achieve within the bounds of the formal language. InCandC++, constructs such aspointertype conversionandunion— C++ adds...
https://en.wikipedia.org/wiki/Reinterpret_cast
Incomputer science,type conversion,[1][2]type casting,[1][3]type coercion,[3]andtype juggling[4][5]are different ways of changing anexpressionfrom onedata typeto another. An example would be the conversion of anintegervalue into afloating pointvalue or its textual representation as astring, and vice versa. Type convers...
https://en.wikipedia.org/wiki/Const_cast