Search Results - stack buffer overflow attack~
-
1
Authors:
Source: 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW). :274-278
-
2
-
3
Authors: et al.
Source: 2024 RISC-V Summit Europe
Subject Terms: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2406.10282
-
4
Authors: et al.
Source: 2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA). :1432-1436
-
5
Authors:
-
6
Authors:
Source: 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS). :888-892
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
-
7
Authors: et al.
Source: VDTS '09 Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems (2009); VDTS '09 Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems, 01-03-2009
Subject Terms: Engineering, computing & technology, Computer science, Ingénierie, informatique & technologie, Sciences informatiques
Access URL: https://orbi.uliege.be/handle/2268/163036
-
8
Authors: et al.
Source: Communications of the ACM; Nov2005, Vol. 48 Issue 11, p51-56, 6p, 1 Diagram
-
9
Source: Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE. :274-278
-
10
-
11
Authors:
Source: Procedia Computer Science. 2019, Vol. 160, p9-14. 6p.
Subject Terms: Leakage, Design protection, Computer security vulnerabilities, Security systems
-
12
Authors: et al.
Contributors: et al.
Source: 2025 IEEE 26th Latin American Test Symposium (LATS) ; page 1-6
-
13
Authors: et al.
Source: Research Collection School Of Computing and Information Systems
Subject Terms: Brute force attack, Canary, Stack buffer overflow, Information Security
File Description: application/pdf
Relation: https://ink.library.smu.edu.sg/sis_research/4101; https://ink.library.smu.edu.sg/context/sis_research/article/5104/viewcontent/Stack_Buffer_Polymorphic_Canaries_2018_DSN_afv.pdf
-
14
Authors: et al.
Source: Applied Sciences, Vol 12, Iss 13, p 6702 (2022)
Subject Terms: buffer overflow attacks, CVE, mitigation techniques, hardware based mitigation approaches, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999
File Description: electronic resource
-
15
Authors:
Thesis Advisors:
File Description: 42
Availability: http://ndltd.ncl.edu.tw/handle/46193434036286249973
-
16
Authors:
Source: Security & Communication Networks; 6/22/2022, p1-9, 9p
Subject Terms: PRODUCTION standards, GOLGI apparatus
Company/Entity: ALLGEMEINE Elektricitats-Gesellschaft AG
-
17
Authors: et al.
Index Terms: Article, PeerReviewed
URL:
http://psasir.upm.edu.my/id/eprint/51814/1/Buffer%20overflow%20attack%20mitigation%20via%20Trusted%20Platform%20Module%20%28TPM%29.pdf http://psasir.upm.edu.my/id/eprint/51814/ http://iukl.edu.my/iukl-research-journal/archives/ http://psasir.upm.edu.my/id/eprint/51814 http://iukl.edu.my/iukl-research-journal/archives -
18
Authors: et al.
Source: Advances in Information & Computer Security; 2006, p268-277, 10p
-
19
Authors:
Source: Procedia Computer Science. 2016, Vol. 83, p1301-1306. 6p.
-
20
Contributors: The Pennsylvania State University CiteSeerX Archives
Subject Terms: Buffer overflow exploit, stack allocation, heap function, memory
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.206.4521; http://www.ijcaonline.org/volume13/number5/pxc3872455.pdf
Nájsť tento článok vo Web of Science
Full Text Finder