Výsledky vyhledávání - buffer overflow vulnerability auditing
-
1
Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis
ISSN: 1751-8806, 1751-8814, 1751-8814Vydáno: The Institution of Engineering and Technology 01.04.2016Vydáno v IET software (01.04.2016)“…Buffer overflow (BOF) vulnerabilities when present in code can be exploited to violate security objectives such as availability, confidentiality and integrity…”
Získat plný text
Journal Article -
2
Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning
ISSN: 1024-123X, 1563-5147Vydáno: Cairo, Egypt Hindawi Publishing Corporation 01.01.2017Vydáno v Mathematical problems in engineering (01.01.2017)“… In this paper, a static analysis method based on machine learning is proposed to assist in auditing buffer overflow vulnerabilities…”
Získat plný text
Journal Article -
3
Auditing Buffer Overflow Vulnerabilities Using Hybrid Static-Dynamic Analysis
ISSN: 0730-3157Vydáno: IEEE 01.07.2014Vydáno v Proceedings - International Computer Software & Applications Conference (01.07.2014)“…Despite being studied for more than two decades buffer overflow vulnerabilities are still frequently reported in programs…”
Získat plný text
Konferenční příspěvek Journal Article -
4
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Vydáno: IEEE 01.06.2023Vydáno v 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC) (01.06.2023)“…One of the most significant challenges in the field of software code auditing is the presence of vulnerabilities in software source code…”
Získat plný text
Konferenční příspěvek -
5
Can source code auditing software identify common vulnerabilities and be used to evaluate software security?
ISBN: 0769520561, 9780769520568Vydáno: IEEE 2004Vydáno v System Sciences: Abstracts of Full Papers, Proceedings 37th International Conference, Hilton Waikoloa Village, Hawaii, 2004 (2004)“…Software vulnerabilities are a growing problem (c.f. MITRE's CVE, http://eve.mitre.org). Moreover, many of the mistakes leading to vulnerabilities are repeated often…”
Získat plný text
Konferenční příspěvek -
6
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
ISSN: 2331-8422Vydáno: Ithaca Cornell University Library, arXiv.org 01.06.2023Vydáno v arXiv.org (01.06.2023)“…One of the most significant challenges in the field of software code auditing is the presence of vulnerabilities in software source code…”
Získat plný text
Paper -
7
A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor
ISBN: 9781467300063, 1467300063Vydáno: IEEE 01.12.2011Vydáno v 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (01.12.2011)“…Buffer overflow (BOF) vulnerabilities in programs might result in unwanted consequences such as neighboring data corruption and execution of arbitrary code…”
Získat plný text
Konferenční příspěvek -
8
Mutation-Based Testing of Integer Overflow Vulnerabilities
ISBN: 9781424436927, 1424436923, 1424436915, 9781424436910ISSN: 2161-9646Vydáno: IEEE 01.09.2009Vydáno v 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing (01.09.2009)“…Integer overflow vulnerability is a kind of common software vulnerabilities, there has been no effective way to detect integer overflow vulnerabilities…”
Získat plný text
Konferenční příspěvek -
9
CodeAuditor: A Vulnerability Detection Framework Based on Constraint Analysis and Model Checking
ISBN: 1424446384, 9781424446384Vydáno: IEEE 01.09.2009Vydáno v 2009 International Conference on Management and Service Science (01.09.2009)“… The presented concepts are targeted at the general class of buffer-related vulnerabilities and can be applied to the detection of vulnerability…”
Získat plný text
Konferenční příspěvek -
10
Enterprise Systems and Threats
ISSN: 1690-4524Vydáno: International Institute of Informatics and Cybernetics 01.06.2021Vydáno v Journal of systemics, cybernetics and informatics (01.06.2021)“… attacks, weak auditing, storage media exposure, unnecessary features enabled, broken configurations, and buffer overflows…”
Získat plný text
Journal Article -
11
On the Verification of Control Flow Attestation Evidence
ISSN: 2331-8422Vydáno: Ithaca Cornell University Library, arXiv.org 16.11.2024Vydáno v arXiv.org (16.11.2024)“… This, in theory, enables secure "run-time auditing" in addition to best-effort attestation, i.e., it guarantees that Vrf can examine execution evidence to identify previously unknown compromises as soon as they are exploited, pinpoint their root cause…”
Získat plný text
Paper -
12
Software security analysis - execution phase audit
ISBN: 9780769524313, 0769524311Vydáno: IEEE 2005Vydáno v EUROMICRO-SEAA 2005: 31st Euromicro Conference on Software Engineering and Advanced Applications (30 August - 03 September 2005/Porto, Portugal) (2005)“… On average, one exploitable vulnerability was found for every 4000 lines of code. Half of the located threats in the product were buffer overflows followed by race condition, misplaced trust, and poor random generators…”
Získat plný text
Konferenční příspěvek -
13
TCP/IP stack fingerprinting for patch detection in a distributed Windows environment
ISBN: 0496172492, 9780496172498Vydáno: ProQuest Dissertations & Theses 01.01.2004“… A missing patch can be essentially considered a vulnerability as the hackers make use of the knowledge of the vulnerability from the security bulletin and attempt attacks for that vulnerability…”
Získat plný text
Dissertation -
14
Chapter 2 - NASL Scripting
ISBN: 1597490059, 9781597490054Vydáno: Elsevier Inc 2005Vydáno v Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (2005)“… NASL was designed to allow users to share their scripts. When a buffer overflow is discovered on a server, someone inevitably writes a NASL script to check for that vulnerability…”
Získat plný text
Kapitola -
15
PentaSafe Extends Database Security to Microsoft SQL Server
Vydáno: New York PR Newswire Association LLC 05.11.2002Vydáno v PR Newswire (05.11.2002)“… PentaSafe has baked the latest Microsoft vulnerability information, including those specifically for buffer overflows, service pack releases, extended stored procedure privileges, and Web tasks into the Agent…”
Získat plný text
Newsletter -
16
BorderWare MXtreme Mail Firewall Rated Most Secure, Best Price- Performer in Federal Computer Week Review
Vydáno: New York Business Wire 06.07.2004Vydáno v Business Wire (06.07.2004)“…: "One of the major benefits of MXtreme is its reporting and auditing capabilities... granular administration, allowing multiple administrators to control specific portions of the appliance…”
Získat plný text
Newsletter

