Výsledky vyhledávání - (( exploiting buffer overflow ) OR ( exploring buffer overflow ))
-
1
Exploiting stack-based buffer overflow using modern day techniques
ISSN: 1877-0509, 1877-0509Vydáno: Elsevier B.V 2019Vydáno v Procedia computer science (2019)“…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow…”
Získat plný text
Journal Article -
2
Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios
“…As wireless systems are becoming more complex, there is a shift towards implementing these systems completely in software and firmware rather than hardware…”Vydáno: IEEE 01.07.2018
Získat plný text
Konferenční příspěvek -
3
Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core
Vydáno: IEEE 11.03.2025Vydáno v 2025 IEEE 26th Latin American Test Symposium (LATS) (11.03.2025)“…The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks…”
Získat plný text
Konferenční příspěvek -
4
Buffer overflow attacks : detect, exploit, prevent
ISBN: 9781932266672, 1932266674Vydáno: Rockland, Mass Syngress 2005“…The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer…”
Získat plný text
E-kniha Kniha -
5
Exploiting buffer overflows over Bluetooth: the BluePass tool
ISBN: 0780390199, 9780780390195ISSN: 1811-3923Vydáno: IEEE 2005Vydáno v Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005 (2005)“… For this reason is not acceptable any kind of unexpected or unsafe failure. Since many embedded systems don't include a security framework and are vulnerable to buffer…”
Získat plný text
Konferenční příspěvek -
6
SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks
ISBN: 9780769526775, 0769526772ISSN: 1060-9857Vydáno: IEEE 01.10.2006Vydáno v 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06) (01.10.2006)“…This paper presents a strong and efficient scheme for protecting against buffer overflow attacks…”
Získat plný text
Konferenční příspěvek -
7
SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks
ISSN: 1060-9857Vydáno: IEEE 01.10.2006Vydáno v 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06) (01.10.2006)Získat plný text
Journal Article -
8
Buffer overflow and format string overflow vulnerabilities
ISSN: 0038-0644, 1097-024XVydáno: Chichester, UK John Wiley & Sons, Ltd 25.04.2003Vydáno v Software, practice & experience (25.04.2003)“… This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures…”
Získat plný text
Journal Article -
9
Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation
ISSN: 1063-6692, 1558-2566Vydáno: New York IEEE 01.02.2010Vydáno v IEEE/ACM transactions on networking (01.02.2010)“… As the first step, we design a network-based length-based signature generator (LESG) for the worms exploiting buffer overflow vulnerabilities…”
Získat plný text
Journal Article -
10
ROPocop — Dynamic mitigation of code-reuse attacks
ISSN: 2214-2126Vydáno: Elsevier Ltd 01.08.2016Vydáno v Journal of information security and applications (01.08.2016)“…Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years…”
Získat plný text
Journal Article -
11
Secure Patrol: Patrolling Against Buffer Overflow Exploits
ISSN: 1939-3555, 1939-3547Vydáno: Philadelphia, PA Taylor & Francis 04.05.2014Vydáno v Information security journal. (04.05.2014)“… Another potential actor in buffer overflow attacks is Global Offset Table (GOT); exploiting it can also lead to disastrous results, such as a call to printf…”
Získat plný text
Journal Article -
12
Exploitation Analysis of Buffer Overflow in SL-Mail Server
ISSN: 2768-0673Vydáno: IEEE 11.11.2021Vydáno v International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (Online) (11.11.2021)“…Buffer overflows are known as the most widely used and the oldest forms of attacks used by attackers to gain access for remote code execution and similar attacks…”
Získat plný text
Konferenční příspěvek -
13
Enhancing security using legality assertions
ISBN: 0769524745, 9780769524740ISSN: 1095-1350Vydáno: IEEE 2005Vydáno v 12th Working Conference on Reverse Engineering (WCRE'05) (2005)“…Buffer overflows have been the most common form of security vulnerability in the past decade…”
Získat plný text
Konferenční příspěvek -
14
Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems
ISSN: 2576-6996Vydáno: IEEE 01.11.2019Vydáno v Proceedings - IEEE International Conference on Computer Design (01.11.2019)“… A well-known attack is ReturnOriented Programming (ROP) which can diverge the control flow of a program by exploiting the buffer overflow vulnerability…”
Získat plný text
Konferenční příspěvek -
15
StackOFFence: a technique for defending against buffer overflow attacks
ISBN: 0769523153, 9780769523156Vydáno: IEEE 2005Vydáno v ITCC 2005 : International Conference on Information Technology: Coding and Computing : proceedings : 4-6 April, 2005, Las Vegas, Nevada (2005)“… This results in software code that is more vulnerable to security intrusions exploiting buffer overflow vulnerabilities…”
Získat plný text
Konferenční příspěvek -
16
Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
ISSN: 2768-1831Vydáno: IEEE 24.04.2025Vydáno v Proceedings (International Symposium on Digital Forensic and Security. Online) (24.04.2025)“… To detect vulnerabilities such as buffer overflows in compiled code, this research investigates the application of unidirectional transformer-based embeddings, specifically G PT-2…”
Získat plný text
Konferenční příspěvek -
17
On Detecting Code Reuse Attacks
ISSN: 0146-4116, 1558-108XVydáno: Moscow Pleiades Publishing 01.12.2020Vydáno v Automatic control and computer sciences (01.12.2020)“…— Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow…”
Získat plný text
Journal Article -
18
Removing architectural bottlenecks to the scalability of speculative parallelization
ISBN: 0769511627, 9780769511627ISSN: 1063-6897“… The solutions that we propose are: low-complexity commit in constant time to eliminate the task commit bottleneck, a memory-based overflow area to eliminate stall due to speculative buffer overflow, and exploiting high-level access…”Vydáno: IEEE 2001
Získat plný text
Konferenční příspěvek -
19
Automatic Exploit Generation for Buffer Overflow Vulnerabilities
Vydáno: IEEE 01.07.2018Vydáno v 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS C) (01.07.2018)“…Buffer overflow vulnerabilities are widely found in software. Finding these vulnerabilities and identifying whether these vulnerabilities can be exploit is very important…”
Získat plný text
Konferenční příspěvek -
20
Cross-layer adaptive transmission with incomplete system state information
ISSN: 0090-6778, 1558-0857Vydáno: New York, NY IEEE 01.11.2008Vydáno v IEEE transactions on communications (01.11.2008)“… Data packets are subject to loss due to buffer overflow and transmission errors. We study the problem of adapting the transmit power and rate based on the buffer…”
Získat plný text
Journal Article

