Suchergebnisse - Buffer overflow exploit

  1. 1

    Secure Patrol: Patrolling Against Buffer Overflow Exploits von Solanki, Jaydeep, Shah, Aenik, Das, Manik Lal

    ISSN: 1939-3555, 1939-3547
    Veröffentlicht: Philadelphia, PA Taylor & Francis 04.05.2014
    Veröffentlicht in Information security journal. (04.05.2014)
    “… Buffer overflow attacks are caused due to exploitation of stack or heap in computer memory …”
    Volltext
    Journal Article
  2. 2

    Buffer overflow attacks : detect, exploit, prevent von Foster, James C.

    ISBN: 9781932266672, 1932266674
    Veröffentlicht: Rockland, Mass Syngress 2005
    “… ; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love …”
    Volltext
    E-Book Buch
  3. 3

    Analysis of Buffer Overflow Exploits and Prevention Strategies von Xu, Shu Xin, Chen, Jun Zhang

    ISBN: 9783038350125, 3038350125
    ISSN: 1660-9336, 1662-7482, 1662-7482
    Veröffentlicht: Zurich Trans Tech Publications Ltd 06.02.2014
    Veröffentlicht in Applied Mechanics and Materials (06.02.2014)
    “… This article first explains the concept of buffer overflow,and then from the programming language itself flawed,not robust perspective on the emergence,to the emergence of buffer overflow attacks …”
    Volltext
    Journal Article
  4. 4

    Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits von Kugler, Christopher, Müller, Tilo

    ISSN: 2032-9393, 2032-9393
    Veröffentlicht: Ghent European Alliance for Innovation (EAI) 05.10.2015
    Veröffentlicht in EAI endorsed transactions on security and safety (05.10.2015)
    “… Despite the fact that protection mechanisms like StackGuard, ASLR and NX are widespread, the development on new defense strategies against stack-based buffer overflows has not yet come to an end …”
    Volltext
    Journal Article
  5. 5

    Techniques for Defending from Buffer Overflow Vulnerability Security Exploits von Padmanabhuni, Bindu, Tan, Hee Beng Kuan

    ISSN: 1089-7801, 1941-0131
    Veröffentlicht: IEEE 2019
    Veröffentlicht in IEEE internet computing (2019)
    “… or have limitations preventing their use and adoption. In this article, we discuss well-known buffer overflow vulnerability exploit mechanisms followed by comprehensive study of proposals for defending from such exploits along with review of tools used …”
    Volltext
    Journal Article
  6. 6

    BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis von Xu, Shenglin, Wang, Yongjun

    ISSN: 1939-0114, 1939-0122
    Veröffentlicht: London Hindawi 22.06.2022
    Veröffentlicht in Security and communication networks (22.06.2022)
    “… In this paper, we propose a solution to alleviate the above difficulties: BofAEG, which is based on symbolic execution and dynamic analysis to automatically detect stack buffer overflow vulnerability and generate exploit …”
    Volltext
    Journal Article
  7. 7

    Automated exploit generation for stack buffer overflow vulnerabilities von Padaryan, V. A., Kaushan, V. V., Fedotov, A. N.

    ISSN: 0361-7688, 1608-3261
    Veröffentlicht: Moscow Pleiades Publishing 01.11.2015
    Veröffentlicht in Programming and computer software (01.11.2015)
    “… An automated method for exploit generation is presented. This method allows one to construct exploits for stack buffer overflow vulnerabilities and to prioritize software bugs …”
    Volltext
    Journal Article
  8. 8

    Buffer Overflow Exploits von Farooq, Khurram, Ugaili, Ayaz

    ISSN: 2616-7476, 1998-4162
    Veröffentlicht: Shaheed Zulfikar Ali Bhutto Institute of Science and Technology 31.12.2003
    Veröffentlicht in JISR Management and Social Sciences & Economics (31.12.2003)
    “… The focus of this Study is on providing an understanding of buffer overflows, the ways they are exploited, and ways to prevent attackers from abusing …”
    Volltext
    Journal Article
  9. 9

    Buffer Overflow Exploit and Defensive Techniques von Desheng Fu, Feiyue Shi

    ISBN: 9781467330930, 1467330930
    ISSN: 2162-8998
    Veröffentlicht: IEEE 01.11.2012
    “… Buffer overflow attack is most common and dangerous attack method at present. So the analysis is useful in studying the principle of buffer overflow and buffer overflow exploits …”
    Volltext
    Tagungsbericht
  10. 10

    Automated exploit generation method for stack buffer overflow vulnerabilities von Padaryan, V.A., Kaushan, V.V., Fedotov, A.N.

    ISSN: 2079-8156, 2220-6426
    Veröffentlicht: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018
    Veröffentlicht in Trudy Instituta sistemnogo programmirovaniâ (01.10.2018)
    “… In this paper automated method for exploit generation is presented. This method allows to construct exploits for stack buffer overflow vulnerabilities and also to prioritize software bugs …”
    Volltext
    Journal Article
  11. 11

    Architectural Support For Stack Buffer Overflow Exploit Prevention von Kao, Wen-Fu

    ISBN: 1267658754, 9781267658753
    Veröffentlicht: ProQuest Dissertations & Theses 01.01.2012
    “… Under the new design paradigm, two proof-of-concept features are presented. A low overhead and yet effective micro-architectural checking mechanism to reduce the risk from stack overflow exploits …”
    Volltext
    Dissertation
  12. 12

    Automatic Exploit Generation for Buffer Overflow Vulnerabilities von Xu, Luhang, Jia, Weixi, Dong, Wei, Li, Yongjun

    Veröffentlicht: IEEE 01.07.2018
    “… Buffer overflow vulnerabilities are widely found in software. Finding these vulnerabilities and identifying whether these vulnerabilities can be exploit is very important …”
    Volltext
    Tagungsbericht
  13. 13

    Amazon.com (AMZN) issued patent titled "Buffer overflow exploit detection"

    Veröffentlicht: Melbourne News Bites Pty Ltd 18.10.2019
    Veröffentlicht in News Bites - Computing & Information (18.10.2019)
    Volltext
    Newsletter
  14. 14

    Amazon Technologies Assigned Patent for Buffer Overflow Exploit Detection

    Veröffentlicht: Washington, D.C Targeted News Service 17.02.2018
    Veröffentlicht in Targeted News Service (17.02.2018)
    Volltext
    Newsletter
  15. 15
  16. 16
  17. 17

    Exploiting stack-based buffer overflow using modern day techniques von Nicula, Ștefan, Zota, Răzvan Daniel

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2019
    Veröffentlicht in Procedia computer science (2019)
    “… Nowadays, due to multiple protection mechanisms enforced by the operating system and on the executable level, the buffer overflow has become harder to exploit …”
    Volltext
    Journal Article
  18. 18

    A metric for identifying system exploitation developed through a study in buffer overflow exploits von Allgeier, Michelle

    ISBN: 0542054760, 9780542054761
    Veröffentlicht: ProQuest Dissertations & Theses 01.01.2004
    “… Buffer overflow exploits are the most utilized method for gaining unauthorized control over a system …”
    Volltext
    Dissertation
  19. 19

    What is a buffer overflow? And how hackers exploit these vulnerabilities von Constantin, Lucian

    Veröffentlicht: Framingham Foundry 22.01.2020
    Veröffentlicht in CSO (Online) (22.01.2020)
    “… Another reason why buffer overflows are back in the spotlight might be the rise of internet-of-things (IoT …”
    Volltext
    Trade Publication Article
  20. 20

    A chit-chat between Llama 2 and ChatGPT for the automated creation of exploits von Caturano, Francesco, Ciotola, Jordan, Romano, Simon Pietro, Varlese, Mario

    ISSN: 1389-1286
    Veröffentlicht: Elsevier B.V 01.10.2025
    Veröffentlicht in Computer networks (Amsterdam, Netherlands : 1999) (01.10.2025)
    “… However, creating a software exploit is typically a time-consuming and manual task that demands a deep understanding of programming, network protocols, operating system internals, and computer architectures …”
    Volltext
    Journal Article