Suchergebnisse - buffer overflow vulnerability auditing

  • Treffer 1 - 16 von 16
Treffer weiter einschränken
  1. 1

    Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis von Padmanabhuni, Bindu Madhavi, Tan, Hee Beng Kuan

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Veröffentlicht: The Institution of Engineering and Technology 01.04.2016
    Veröffentlicht in IET software (01.04.2016)
    “… Buffer overflow (BOF) vulnerabilities when present in code can be exploited to violate security objectives such as availability, confidentiality and integrity …”
    Volltext
    Journal Article
  2. 2

    Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning von Tang, Chaojing, Zhang, Bin, Feng, Chao, Meng, Qingkun

    ISSN: 1024-123X, 1563-5147
    Veröffentlicht: Cairo, Egypt Hindawi Publishing Corporation 01.01.2017
    Veröffentlicht in Mathematical problems in engineering (01.01.2017)
    “… In this paper, a static analysis method based on machine learning is proposed to assist in auditing buffer overflow vulnerabilities …”
    Volltext
    Journal Article
  3. 3

    Auditing Buffer Overflow Vulnerabilities Using Hybrid Static-Dynamic Analysis von Padmanabhuni, Bindu Madhavi, Kuan Tan, Hee Beng

    ISSN: 0730-3157
    Veröffentlicht: IEEE 01.07.2014
    “… Despite being studied for more than two decades buffer overflow vulnerabilities are still frequently reported in programs …”
    Volltext
    Tagungsbericht Journal Article
  4. 4

    Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks von Akter, Mst Shapna, Shahriar, Hossain, Cardenas, Juan Rodriguez, Iqbal Ahamed, Sheikh, Cuzzocrea, Alfredo

    Veröffentlicht: IEEE 01.06.2023
    “… One of the most significant challenges in the field of software code auditing is the presence of vulnerabilities in software source code …”
    Volltext
    Tagungsbericht
  5. 5

    Can source code auditing software identify common vulnerabilities and be used to evaluate software security? von Heffley, J., Meunier, P.

    ISBN: 0769520561, 9780769520568
    Veröffentlicht: IEEE 2004
    “… Software vulnerabilities are a growing problem (c.f. MITRE's CVE, http://eve.mitre.org). Moreover, many of the mistakes leading to vulnerabilities are repeated often …”
    Volltext
    Tagungsbericht
  6. 6

    Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks von Akter, Mst Shapna, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Cuzzocrea, Alfredo

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 01.06.2023
    Veröffentlicht in arXiv.org (01.06.2023)
    “… One of the most significant challenges in the field of software code auditing is the presence of vulnerabilities in software source code …”
    Volltext
    Paper
  7. 7

    A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor von Shahriar, H., Zulkernine, M.

    ISBN: 9781467300063, 1467300063
    Veröffentlicht: IEEE 01.12.2011
    “… Buffer overflow (BOF) vulnerabilities in programs might result in unwanted consequences such as neighboring data corruption and execution of arbitrary code …”
    Volltext
    Tagungsbericht
  8. 8

    Mutation-Based Testing of Integer Overflow Vulnerabilities von Fanping Zeng, Liangliang Mao, Zhide Chen, Qing Cao

    ISBN: 9781424436927, 1424436923, 1424436915, 9781424436910
    ISSN: 2161-9646
    Veröffentlicht: IEEE 01.09.2009
    “… Integer overflow vulnerability is a kind of common software vulnerabilities, there has been no effective way to detect integer overflow vulnerabilities …”
    Volltext
    Tagungsbericht
  9. 9

    CodeAuditor: A Vulnerability Detection Framework Based on Constraint Analysis and Model Checking von Lei Wang, Gui Chen, Jianan Wang, Pengchao Zhao, Qiang Zhang

    ISBN: 1424446384, 9781424446384
    Veröffentlicht: IEEE 01.09.2009
    “… The presented concepts are targeted at the general class of buffer-related vulnerabilities and can be applied to the detection of vulnerability …”
    Volltext
    Tagungsbericht
  10. 10

    Enterprise Systems and Threats von Risa Blair

    ISSN: 1690-4524
    Veröffentlicht: International Institute of Informatics and Cybernetics 01.06.2021
    Veröffentlicht in Journal of systemics, cybernetics and informatics (01.06.2021)
    “… attacks, weak auditing, storage media exposure, unnecessary features enabled, broken configurations, and buffer overflows …”
    Volltext
    Journal Article
  11. 11

    On the Verification of Control Flow Attestation Evidence von Caulfield, Adam, Rattanavipanon, Norrathep, De Oliveira Nunes, Ivan

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 16.11.2024
    Veröffentlicht in arXiv.org (16.11.2024)
    “… This, in theory, enables secure "run-time auditing" in addition to best-effort attestation, i.e., it guarantees that Vrf can examine execution evidence to identify previously unknown compromises as soon as they are exploited, pinpoint their root cause …”
    Volltext
    Paper
  12. 12

    Software security analysis - execution phase audit von Carlsson, B., Baca, D.

    ISBN: 9780769524313, 0769524311
    Veröffentlicht: IEEE 2005
    “… On average, one exploitable vulnerability was found for every 4000 lines of code. Half of the located threats in the product were buffer overflows followed by race condition, misplaced trust, and poor random generators …”
    Volltext
    Tagungsbericht
  13. 13

    TCP/IP stack fingerprinting for patch detection in a distributed Windows environment von Ganesan, Balaji

    ISBN: 0496172492, 9780496172498
    Veröffentlicht: ProQuest Dissertations & Theses 01.01.2004
    “… A missing patch can be essentially considered a vulnerability as the hackers make use of the knowledge of the vulnerability from the security bulletin and attempt attacks for that vulnerability …”
    Volltext
    Dissertation
  14. 14

    Chapter 2 - NASL Scripting von James C. Foster, Mike Price

    ISBN: 1597490059, 9781597490054
    Veröffentlicht: Elsevier Inc 2005
    “… NASL was designed to allow users to share their scripts. When a buffer overflow is discovered on a server, someone inevitably writes a NASL script to check for that vulnerability …”
    Volltext
    Buchkapitel
  15. 15

    PentaSafe Extends Database Security to Microsoft SQL Server

    Veröffentlicht: New York PR Newswire Association LLC 05.11.2002
    Veröffentlicht in PR Newswire (05.11.2002)
    “… PentaSafe has baked the latest Microsoft vulnerability information, including those specifically for buffer overflows, service pack releases, extended stored procedure privileges, and Web tasks into the Agent …”
    Volltext
    Newsletter
  16. 16

    BorderWare MXtreme Mail Firewall Rated Most Secure, Best Price- Performer in Federal Computer Week Review

    Veröffentlicht: New York Business Wire 06.07.2004
    Veröffentlicht in Business Wire (06.07.2004)
    “… : "One of the major benefits of MXtreme is its reporting and auditing capabilities... granular administration, allowing multiple administrators to control specific portions of the appliance …”
    Volltext
    Newsletter