Suchergebnisse - stack buffer overflow attack
-
1
Autoren:
Quelle: 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW). :274-278
-
2
-
3
Autoren: et al.
Quelle: 2024 RISC-V Summit Europe
Schlagwörter: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
Zugangs-URL: http://arxiv.org/abs/2406.10282
-
4
Autoren: et al.
Quelle: 2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA). :1432-1436
-
5
Autoren:
Index Begriffe: Trusted execution environment, Stack overflow prevention method, System security, Conference Paper., AM.
-
6
Autoren:
Quelle: 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS). :888-892
Schlagwörter: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
7
Autoren: et al.
Quelle: VDTS '09 Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems (2009); VDTS '09 Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, 01-03-2009
Schlagwörter: Engineering, computing & technology, Computer science, Ingénierie, informatique & technologie, Sciences informatiques
Zugangs-URL: https://orbi.uliege.be/handle/2268/163036
-
8
Autoren: et al.
Quelle: Communications of the ACM; Nov2005, Vol. 48 Issue 11, p51-56, 6p, 1 Diagram
-
9
Quelle: Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE. :274-278
-
10
-
11
Autoren:
Quelle: Procedia Computer Science. 2019, Vol. 160, p9-14. 6p.
Schlagwörter: Leakage, Design protection, Computer security vulnerabilities, Security systems
-
12
Autoren: et al.
Weitere Verfasser: et al.
Quelle: 2025 IEEE 26th Latin American Test Symposium (LATS) ; page 1-6
-
13
Autoren: et al.
Quelle: Research Collection School Of Computing and Information Systems
Schlagwörter: Brute force attack, Canary, Stack buffer overflow, Information Security
Dateibeschreibung: application/pdf
Relation: https://ink.library.smu.edu.sg/sis_research/4101; https://ink.library.smu.edu.sg/context/sis_research/article/5104/viewcontent/Stack_Buffer_Polymorphic_Canaries_2018_DSN_afv.pdf
-
14
Autoren: et al.
Quelle: Applied Sciences, Vol 12, Iss 13, p 6702 (2022)
Schlagwörter: buffer overflow attacks, CVE, mitigation techniques, hardware based mitigation approaches, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
Dateibeschreibung: electronic resource
-
15
Autoren:
Thesis Advisors:
Dateibeschreibung: 42
Verfügbarkeit: http://ndltd.ncl.edu.tw/handle/46193434036286249973
-
16
Autoren:
Quelle: Security & Communication Networks; 6/22/2022, p1-9, 9p
Schlagwörter: PRODUCTION standards, GOLGI apparatus
Firma/Körperschaft: ALLGEMEINE Elektricitats-Gesellschaft AG
-
17
Autoren: et al.
Index Begriffe: Article, PeerReviewed
URL:
http://psasir.upm.edu.my/id/eprint/51814/1/Buffer%20overflow%20attack%20mitigation%20via%20Trusted%20Platform%20Module%20%28TPM%29.pdf http://psasir.upm.edu.my/id/eprint/51814/ http://iukl.edu.my/iukl-research-journal/archives/ http://psasir.upm.edu.my/id/eprint/51814 http://iukl.edu.my/iukl-research-journal/archives -
18
Autoren: et al.
Quelle: Advances in Information & Computer Security; 2006, p268-277, 10p
-
19
Autoren:
Quelle: Procedia Computer Science. 2016, Vol. 83, p1301-1306. 6p.
-
20
Weitere Verfasser: The Pennsylvania State University CiteSeerX Archives
Schlagwörter: Buffer overflow exploit, stack allocation, heap function, memory
Dateibeschreibung: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.206.4521; http://www.ijcaonline.org/volume13/number5/pxc3872455.pdf
Nájsť tento článok vo Web of Science
Full Text Finder