Object-code buffer overrun evaluator

security, programming, tool
(OBOE) A tool by R. Banfi, D. Bruschi, and E. Rosti for the automatic detection of buffer overflow vulnerabilities in object code. OBOE can be applied to operating system components as well as ordinary application programs. It was designed for the system administrator to identify vulnerable programs before they are exploited. Being automatic, OBOE can be run as a background process for the analysis of all potentially insecure programs installed on a Unix system. It runs on HP-UX, Linux, and Sun Solaris.


Read Also:

  • Object compatibility standard

    (OCS) An 88open standard for compilers and linkers.

  • Object-complement

    noun, Grammar. 1. a word or a group of words used in the predicate following a factitive verb and referring to its direct object, as treasurer in We appointed him treasurer, white in They painted the house white, or an interesting speaker in They thought him an interesting speaker.

  • Object constraint language

    language (OCL) A formal specification language extension to UML. The Object Constraint Language is a precise text language that provides constraint and object query expressions on an object-oriented model that cannot otherwise be expressed by diagrammatic notation. OCL supplements UML by providing expressions that have neither the ambiguities of natural language nor the inherent difficulty […]

  • Object database management group

    Object Data Management Group

Disclaimer: Object-code buffer overrun evaluator definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.