Suchergebnisse - (( exploiting buffer overflow ) OR ( exploring buffer overflow ))

  1. 1

    Exploiting stack-based buffer overflow using modern day techniques von Nicula, Ștefan, Zota, Răzvan Daniel

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2019
    Veröffentlicht in Procedia computer science (2019)
    “… One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow …”
    Volltext
    Journal Article
  2. 2

    Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios von Hitefield, S. D., Fowler, M., Clancy, T. Charles

    Veröffentlicht: IEEE 01.07.2018
    “… As wireless systems are becoming more complex, there is a shift towards implementing these systems completely in software and firmware rather than hardware …”
    Volltext
    Tagungsbericht
  3. 3

    Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core von Chenet, Cristiano Pegoraro, Savino, Alessandro, Di Carlo, Stefano

    Veröffentlicht: IEEE 11.03.2025
    Veröffentlicht in 2025 IEEE 26th Latin American Test Symposium (LATS) (11.03.2025)
    “… The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks …”
    Volltext
    Tagungsbericht
  4. 4

    Buffer overflow attacks : detect, exploit, prevent von Foster, James C.

    ISBN: 9781932266672, 1932266674
    Veröffentlicht: Rockland, Mass Syngress 2005
    “… The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer …”
    Volltext
    E-Book Buch
  5. 5

    Exploiting buffer overflows over Bluetooth: the BluePass tool von Gianluigi Me

    ISBN: 0780390199, 9780780390195
    ISSN: 1811-3923
    Veröffentlicht: IEEE 2005
    “… For this reason is not acceptable any kind of unexpected or unsafe failure. Since many embedded systems don't include a security framework and are vulnerable to buffer …”
    Volltext
    Tagungsbericht
  6. 6

    SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks von Shinagawa, T.

    ISBN: 9780769526775, 0769526772
    ISSN: 1060-9857
    Veröffentlicht: IEEE 01.10.2006
    “… This paper presents a strong and efficient scheme for protecting against buffer overflow attacks …”
    Volltext
    Tagungsbericht
  7. 7
  8. 8

    Buffer overflow and format string overflow vulnerabilities von Lhee, Kyung-Suk, Chapin, Steve J.

    ISSN: 0038-0644, 1097-024X
    Veröffentlicht: Chichester, UK John Wiley & Sons, Ltd 25.04.2003
    Veröffentlicht in Software, practice & experience (25.04.2003)
    “… This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures …”
    Volltext
    Journal Article
  9. 9

    Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation von Wang, Lanjia, Li, Zhichun, Chen, Yan, Fu, Zhi (Judy), Li, Xing

    ISSN: 1063-6692, 1558-2566
    Veröffentlicht: New York IEEE 01.02.2010
    Veröffentlicht in IEEE/ACM transactions on networking (01.02.2010)
    “… As the first step, we design a network-based length-based signature generator (LESG) for the worms exploiting buffer overflow vulnerabilities …”
    Volltext
    Journal Article
  10. 10

    ROPocop — Dynamic mitigation of code-reuse attacks von Follner, Andreas, Bodden, Eric

    ISSN: 2214-2126
    Veröffentlicht: Elsevier Ltd 01.08.2016
    Veröffentlicht in Journal of information security and applications (01.08.2016)
    “… Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years …”
    Volltext
    Journal Article
  11. 11

    Secure Patrol: Patrolling Against Buffer Overflow Exploits von Solanki, Jaydeep, Shah, Aenik, Das, Manik Lal

    ISSN: 1939-3555, 1939-3547
    Veröffentlicht: Philadelphia, PA Taylor & Francis 04.05.2014
    Veröffentlicht in Information security journal. (04.05.2014)
    “… Another potential actor in buffer overflow attacks is Global Offset Table (GOT); exploiting it can also lead to disastrous results, such as a call to printf …”
    Volltext
    Journal Article
  12. 12

    Exploitation Analysis of Buffer Overflow in SL-Mail Server von Shafana, N. Jeenath, Pawar, Kshitij

    ISSN: 2768-0673
    Veröffentlicht: IEEE 11.11.2021
    “… Buffer overflows are known as the most widely used and the oldest forms of attacks used by attackers to gain access for remote code execution and similar attacks …”
    Volltext
    Tagungsbericht
  13. 13

    Enhancing security using legality assertions von Lei Wang, Cordy, J.R., Dean, T.R.

    ISBN: 0769524745, 9780769524740
    ISSN: 1095-1350
    Veröffentlicht: IEEE 2005
    “… Buffer overflows have been the most common form of security vulnerability in the past decade …”
    Volltext
    Tagungsbericht
  14. 14

    Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems von Hao, Xiaochen, Lv, Mingsong, Zheng, Jiesheng, Zhang, Zhengkui, Yi, Wang

    ISSN: 2576-6996
    Veröffentlicht: IEEE 01.11.2019
    “… A well-known attack is ReturnOriented Programming (ROP) which can diverge the control flow of a program by exploiting the buffer overflow vulnerability …”
    Volltext
    Tagungsbericht
  15. 15

    StackOFFence: a technique for defending against buffer overflow attacks von Madan, B.B., Phoha, S., Trivedi, K.S.

    ISBN: 0769523153, 9780769523156
    Veröffentlicht: IEEE 2005
    “… This results in software code that is more vulnerable to security intrusions exploiting buffer overflow vulnerabilities …”
    Volltext
    Tagungsbericht
  16. 16

    Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code von McCully, Gary A., Hastings, John D., Xu, Shengjie, Fortier, Adam

    ISSN: 2768-1831
    Veröffentlicht: IEEE 24.04.2025
    “… To detect vulnerabilities such as buffer overflows in compiled code, this research investigates the application of unidirectional transformer-based embeddings, specifically G PT-2 …”
    Volltext
    Tagungsbericht
  17. 17

    On Detecting Code Reuse Attacks von Kosolapov, Y. V.

    ISSN: 0146-4116, 1558-108X
    Veröffentlicht: Moscow Pleiades Publishing 01.12.2020
    Veröffentlicht in Automatic control and computer sciences (01.12.2020)
    “… — Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow …”
    Volltext
    Journal Article
  18. 18

    Removing architectural bottlenecks to the scalability of speculative parallelization von Prvulovic, M., Garzaran, M.J., Rauchwerger, L., Torrellas, J.

    ISBN: 0769511627, 9780769511627
    ISSN: 1063-6897
    Veröffentlicht: IEEE 2001
    “… The solutions that we propose are: low-complexity commit in constant time to eliminate the task commit bottleneck, a memory-based overflow area to eliminate stall due to speculative buffer overflow, and exploiting high-level access …”
    Volltext
    Tagungsbericht
  19. 19

    Automatic Exploit Generation for Buffer Overflow Vulnerabilities von Xu, Luhang, Jia, Weixi, Dong, Wei, Li, Yongjun

    Veröffentlicht: IEEE 01.07.2018
    “… Buffer overflow vulnerabilities are widely found in software. Finding these vulnerabilities and identifying whether these vulnerabilities can be exploit is very important …”
    Volltext
    Tagungsbericht
  20. 20

    Cross-layer adaptive transmission with incomplete system state information von Anh Tuan Hoang, Motani, M.

    ISSN: 0090-6778, 1558-0857
    Veröffentlicht: New York, NY IEEE 01.11.2008
    Veröffentlicht in IEEE transactions on communications (01.11.2008)
    “… Data packets are subject to loss due to buffer overflow and transmission errors. We study the problem of adapting the transmit power and rate based on the buffer …”
    Volltext
    Journal Article