Suchergebnisse - Stack buffer overflow
-
1
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
ISSN: 1545-5971, 1941-0018Veröffentlicht: Washington IEEE 01.11.2013Veröffentlicht in IEEE transactions on dependable and secure computing (01.11.2013)“… This paper presents SafeStack, a system that can automatically diagnose and patch stack-based buffer overflow vulnerabilities …”
Volltext
Journal Article -
2
Smart fuzzing method for detecting stack-based buffer overflow in binary codes
ISSN: 1751-8806, 1751-8814, 1751-8814Veröffentlicht: The Institution of Engineering and Technology 01.08.2016Veröffentlicht in IET software (01.08.2016)“… During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the computer systems …”
Volltext
Journal Article -
3
RS-Stack: Defense against Stack Buffer Overflow Attack with Random Shadow Stack
Veröffentlicht: IEEE 28.10.2022Veröffentlicht in 2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA) (28.10.2022)“… Shadow stack is a method to prevent stack buffer overflow attack. However, in the existing shadow stack solutions, it is often supposed that the shadow stack is safe, but the reality is not always the case …”
Volltext
Tagungsbericht -
4
BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis
ISSN: 1939-0114, 1939-0122Veröffentlicht: London Hindawi 22.06.2022Veröffentlicht in Security and communication networks (22.06.2022)“… Stack buffer overflow vulnerability is a common software vulnerability that can overwrite function return addresses and hijack program control flow, causing serious system problems …”
Volltext
Journal Article -
5
To Detect Stack Buffer Overflow with Polymorphic Canaries
ISSN: 2158-3927Veröffentlicht: IEEE 01.06.2018Veröffentlicht in Proceedings - International Conference on Dependable Systems and Networks (01.06.2018)“… Stack Smashing Protection (SSP) is a simple and highly efficient technique widely used in practice as the front line defense against stack buffer overflow attacks …”
Volltext
Tagungsbericht -
6
Exploiting stack-based buffer overflow using modern day techniques
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2019Veröffentlicht in Procedia computer science (2019)“… One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow …”
Volltext
Journal Article -
7
Automated exploit generation for stack buffer overflow vulnerabilities
ISSN: 0361-7688, 1608-3261Veröffentlicht: Moscow Pleiades Publishing 01.11.2015Veröffentlicht in Programming and computer software (01.11.2015)“… An automated method for exploit generation is presented. This method allows one to construct exploits for stack buffer overflow vulnerabilities and to prioritize software bugs …”
Volltext
Journal Article -
8
Automated exploit generation method for stack buffer overflow vulnerabilities
ISSN: 2079-8156, 2220-6426Veröffentlicht: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018Veröffentlicht in Trudy Instituta sistemnogo programmirovaniâ (01.10.2018)“… In this paper automated method for exploit generation is presented. This method allows to construct exploits for stack buffer overflow vulnerabilities and also to prioritize software bugs …”
Volltext
Journal Article -
9
Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2016Veröffentlicht in Procedia computer science (2016)“… We address the particular cyber attack technique known as stack buffer overflow in GNU/Linux operating systems, which are widely used in HPC environments …”
Volltext
Journal Article -
10
On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer Overflows
Veröffentlicht: IEEE 01.08.2014Veröffentlicht in 2014 IEEE 13th International Symposium on Network Computing and Applications (01.08.2014)“… This paper assess the effectiveness of these techniques against stack buffer overflow exploitation …”
Volltext
Tagungsbericht -
11
Window Canaries: Re-thinking Stack Canaries for Architectures with Register Windows
ISSN: 1545-5971, 1941-0018Veröffentlicht: Washington IEEE 01.11.2023Veröffentlicht in IEEE transactions on dependable and secure computing (01.11.2023)“… The approach offers low performance overhead while guaranteeing that return addresses are protected by stack buffer overflows without relying on a heuristic that decides which functions to instrument …”
Volltext
Journal Article -
12
StackSpecter: Detecting Stack Buffer Overflows for the Xtensa Architecture
ISSN: 2474-154XVeröffentlicht: IEEE 27.11.2024Veröffentlicht in Australasian Telecommunication Networks and Applications Conference [proceedings] (27.11.2024)“… This paper presents a new approach, StackSpecter, for stack buffer overflow detection, specifically for architectures with register windows …”
Volltext
Tagungsbericht -
13
Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core
Veröffentlicht: IEEE 11.03.2025Veröffentlicht in 2025 IEEE 26th Latin American Test Symposium (LATS) (11.03.2025)“… The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks …”
Volltext
Tagungsbericht -
14
Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE
ISSN: 2832-1324Veröffentlicht: IEEE 27.11.2023Veröffentlicht in International Symposium on Computing and Networking Workshops (Online) (27.11.2023)“… In this study, we investigate the security features applied to trusted applications (TA) in OP-TEE and clarify the lack of protection against stack buffer overflow in TA command calls …”
Volltext
Tagungsbericht -
15
Stack Memory Buffer Overflow Protection based on Duplication and Randomization
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2013Veröffentlicht in Procedia computer science (2013)“… Vulnerabilities in the program's stack are commonly exploited by attackers in the form of stack-based attacks …”
Volltext
Journal Article -
16
Buffer/Stack Overflow
ISBN: 9781119719083, 1119719089Veröffentlicht: United States John Wiley & Sons, Incorporated 2021Veröffentlicht in Kali Linux Penetration Testing Bible (2021)Volltext
Buchkapitel -
17
HardStack: Prevent Stack Buffer Overflow Attack with LBR
Veröffentlicht: IEEE 01.12.2019Veröffentlicht in 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) (01.12.2019)“… Stack buffer overflow attack can temper with software control flow by continuously injecting data into stack and overwriting function return address …”
Volltext
Tagungsbericht -
18
Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks
ISSN: 0272-1732, 1937-4143Veröffentlicht: Los Alamitos IEEE 01.07.2006Veröffentlicht in IEEE MICRO (01.07.2006)“… A microarchitecture-based, software-transparent mechanism offers protection against stack-based buffer overflow attacks with moderate hardware cost and negligible performance …”
Volltext
Journal Article -
19
Nile: A Programmable Monitoring Coprocessor
ISSN: 1556-6056, 1556-6064Veröffentlicht: New York IEEE 01.01.2018Veröffentlicht in IEEE computer architecture letters (01.01.2018)“… Researchers widely employ hardware performance counters (HPCs) as well as debugging and profiling tools in processors for monitoring different events such as …”
Volltext
Journal Article -
20
Hardware-based stack buffer overflow attack detection on RISC-V architectures
ISSN: 2331-8422Veröffentlicht: Ithaca Cornell University Library, arXiv.org 12.06.2024Veröffentlicht in arXiv.org (12.06.2024)“… This work evaluates how well hardware-based approaches detect stack buffer overflow (SBO …”
Volltext
Paper

