Suchergebnisse - (( exploiting buffer overflow ) OR ( exploring buffer overflow ))
-
1
Exploiting stack-based buffer overflow using modern day techniques
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2019Veröffentlicht in Procedia computer science (2019)“… One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow …”
Volltext
Journal Article -
2
Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios
Veröffentlicht: IEEE 01.07.2018Veröffentlicht in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (01.07.2018)“… As wireless systems are becoming more complex, there is a shift towards implementing these systems completely in software and firmware rather than hardware …”
Volltext
Tagungsbericht -
3
Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core
Veröffentlicht: IEEE 11.03.2025Veröffentlicht in 2025 IEEE 26th Latin American Test Symposium (LATS) (11.03.2025)“… The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks …”
Volltext
Tagungsbericht -
4
Buffer overflow attacks : detect, exploit, prevent
ISBN: 9781932266672, 1932266674Veröffentlicht: Rockland, Mass Syngress 2005“… The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer …”
Volltext
E-Book Buch -
5
Exploiting buffer overflows over Bluetooth: the BluePass tool
ISBN: 0780390199, 9780780390195ISSN: 1811-3923Veröffentlicht: IEEE 2005Veröffentlicht in Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005 (2005)“… For this reason is not acceptable any kind of unexpected or unsafe failure. Since many embedded systems don't include a security framework and are vulnerable to buffer …”
Volltext
Tagungsbericht -
6
SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks
ISBN: 9780769526775, 0769526772ISSN: 1060-9857Veröffentlicht: IEEE 01.10.2006Veröffentlicht in 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06) (01.10.2006)“… This paper presents a strong and efficient scheme for protecting against buffer overflow attacks …”
Volltext
Tagungsbericht -
7
SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks
ISSN: 1060-9857Veröffentlicht: IEEE 01.10.2006Veröffentlicht in 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06) (01.10.2006)Volltext
Journal Article -
8
Buffer overflow and format string overflow vulnerabilities
ISSN: 0038-0644, 1097-024XVeröffentlicht: Chichester, UK John Wiley & Sons, Ltd 25.04.2003Veröffentlicht in Software, practice & experience (25.04.2003)“… This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures …”
Volltext
Journal Article -
9
Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation
ISSN: 1063-6692, 1558-2566Veröffentlicht: New York IEEE 01.02.2010Veröffentlicht in IEEE/ACM transactions on networking (01.02.2010)“… As the first step, we design a network-based length-based signature generator (LESG) for the worms exploiting buffer overflow vulnerabilities …”
Volltext
Journal Article -
10
ROPocop — Dynamic mitigation of code-reuse attacks
ISSN: 2214-2126Veröffentlicht: Elsevier Ltd 01.08.2016Veröffentlicht in Journal of information security and applications (01.08.2016)“… Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years …”
Volltext
Journal Article -
11
Secure Patrol: Patrolling Against Buffer Overflow Exploits
ISSN: 1939-3555, 1939-3547Veröffentlicht: Philadelphia, PA Taylor & Francis 04.05.2014Veröffentlicht in Information security journal. (04.05.2014)“… Another potential actor in buffer overflow attacks is Global Offset Table (GOT); exploiting it can also lead to disastrous results, such as a call to printf …”
Volltext
Journal Article -
12
Exploitation Analysis of Buffer Overflow in SL-Mail Server
ISSN: 2768-0673Veröffentlicht: IEEE 11.11.2021Veröffentlicht in International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (Online) (11.11.2021)“… Buffer overflows are known as the most widely used and the oldest forms of attacks used by attackers to gain access for remote code execution and similar attacks …”
Volltext
Tagungsbericht -
13
Enhancing security using legality assertions
ISBN: 0769524745, 9780769524740ISSN: 1095-1350Veröffentlicht: IEEE 2005Veröffentlicht in 12th Working Conference on Reverse Engineering (WCRE'05) (2005)“… Buffer overflows have been the most common form of security vulnerability in the past decade …”
Volltext
Tagungsbericht -
14
Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems
ISSN: 2576-6996Veröffentlicht: IEEE 01.11.2019Veröffentlicht in Proceedings - IEEE International Conference on Computer Design (01.11.2019)“… A well-known attack is ReturnOriented Programming (ROP) which can diverge the control flow of a program by exploiting the buffer overflow vulnerability …”
Volltext
Tagungsbericht -
15
StackOFFence: a technique for defending against buffer overflow attacks
ISBN: 0769523153, 9780769523156Veröffentlicht: IEEE 2005Veröffentlicht in ITCC 2005 : International Conference on Information Technology: Coding and Computing : proceedings : 4-6 April, 2005, Las Vegas, Nevada (2005)“… This results in software code that is more vulnerable to security intrusions exploiting buffer overflow vulnerabilities …”
Volltext
Tagungsbericht -
16
Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
ISSN: 2768-1831Veröffentlicht: IEEE 24.04.2025Veröffentlicht in Proceedings (International Symposium on Digital Forensic and Security. Online) (24.04.2025)“… To detect vulnerabilities such as buffer overflows in compiled code, this research investigates the application of unidirectional transformer-based embeddings, specifically G PT-2 …”
Volltext
Tagungsbericht -
17
On Detecting Code Reuse Attacks
ISSN: 0146-4116, 1558-108XVeröffentlicht: Moscow Pleiades Publishing 01.12.2020Veröffentlicht in Automatic control and computer sciences (01.12.2020)“… — Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow …”
Volltext
Journal Article -
18
Removing architectural bottlenecks to the scalability of speculative parallelization
ISBN: 0769511627, 9780769511627ISSN: 1063-6897Veröffentlicht: IEEE 2001Veröffentlicht in Proceedings 28th Annual International Symposium on Computer Architecture (2001)“… The solutions that we propose are: low-complexity commit in constant time to eliminate the task commit bottleneck, a memory-based overflow area to eliminate stall due to speculative buffer overflow, and exploiting high-level access …”
Volltext
Tagungsbericht -
19
Automatic Exploit Generation for Buffer Overflow Vulnerabilities
Veröffentlicht: IEEE 01.07.2018Veröffentlicht in 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS C) (01.07.2018)“… Buffer overflow vulnerabilities are widely found in software. Finding these vulnerabilities and identifying whether these vulnerabilities can be exploit is very important …”
Volltext
Tagungsbericht -
20
Cross-layer adaptive transmission with incomplete system state information
ISSN: 0090-6778, 1558-0857Veröffentlicht: New York, NY IEEE 01.11.2008Veröffentlicht in IEEE transactions on communications (01.11.2008)“… Data packets are subject to loss due to buffer overflow and transmission errors. We study the problem of adapting the transmit power and rate based on the buffer …”
Volltext
Journal Article

