Suchergebnisse - buffer overflow vulnerability diagnosis
-
1
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
ISSN: 1545-5971, 1941-0018Veröffentlicht: Washington IEEE 01.11.2013Veröffentlicht in IEEE transactions on dependable and secure computing (01.11.2013)“… This paper presents SafeStack, a system that can automatically diagnose and patch stack-based buffer overflow vulnerabilities …”
Volltext
Journal Article -
2
Buffer overflow vulnerability diagnosis for commodity software
ISBN: 9781109053999, 1109053991Veröffentlicht: ProQuest Dissertations & Theses 01.01.2008“… The existence of buffer overflow vulnerabilities makes the system susceptible to Internet worms and denial of service (DDoS …”
Volltext
Dissertation -
3
Memory Vulnerability Diagnosis for Binary Program
ISSN: 2271-2097, 2431-7578, 2271-2097Veröffentlicht: Les Ulis EDP Sciences 2016Veröffentlicht in ITM web of conferences (2016)“… The diagnosis methods target at buffer overflow, use after free (UAF) and format string vulnerabilities …”
Volltext
Journal Article Tagungsbericht -
4
A fine-grained classification and security analysis of web-based virtual machine vulnerabilities
ISSN: 0167-4048, 1872-6208Veröffentlicht: Amsterdam Elsevier Ltd 01.06.2021Veröffentlicht in Computers & security (01.06.2021)“… The design and implementation of Inscription, the first fully automated Adobe Flash binary code transformation system that can guard major Flash vulnerability categories without modifying vulnerable …”
Volltext
Journal Article -
5
Exploitation Analysis of Buffer Overflow in SL-Mail Server
ISSN: 2768-0673Veröffentlicht: IEEE 11.11.2021Veröffentlicht in International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (Online) (11.11.2021)“… Buffer overflows are the vulnerabilities which are exploited due copying function which aren't set to be bounded …”
Volltext
Tagungsbericht -
6
Exploiting Control Device Vulnerabilities: Attacking Cyber-Physical Water System
ISSN: 2305-7254Veröffentlicht: FRUCT Oy 09.11.2022Veröffentlicht in Proceedings of the XXth Conference of Open Innovations Association FRUCT (09.11.2022)“… ), Buffer overflow, privilege escalation, and illegal command injection attacks are executed, and their impacts are investigated using CIA and STRIDE threat modeling …”
Volltext
Tagungsbericht -
7
LLM-Based Approach for Buffer Overflow Detection in Source Code
ISSN: 2474-9656Veröffentlicht: IEEE 20.12.2024Veröffentlicht in Computer and information technology (20.12.2024)“… One major security issue is CWE-120, which deals with buffer overflow vulnerabilities …”
Volltext
Tagungsbericht -
8
Reversing to detect software vulnerabilities
Veröffentlicht: AISTI 01.06.2017Veröffentlicht in 2017 12th Iberian Conference on Information Systems and Technologies (CISTI) (01.06.2017)“… Software disassembling is an interesting approach to discover vulnerabilities. Unmounting an application into Assembly code can reveal multiple characteristics from the software …”
Volltext
Tagungsbericht -
9
HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows
ISSN: 1530-0889Veröffentlicht: IEEE 01.06.2015Veröffentlicht in Proceedings - International Conference on Dependable Systems and Networks (01.06.2015)“… For decades buffer overflows have been one of the most prevalent and dangerous software vulnerabilities …”
Volltext
Tagungsbericht -
10
Improving software security with concurrent monitoring, automated diagnosis, and self-shielding
ISBN: 1321578512, 9781321578515Veröffentlicht: ProQuest Dissertations & Theses 01.01.2014“… The society nowadays relies heavily on digitized information and services. Among others, cyber-security is one of the cornerstones of the digital world. The …”
Volltext
Dissertation -
11
Static Security Analysis Based on Input-Related Software Faults
ISBN: 1424437555, 0769535895, 9781424437559, 9780769535890ISSN: 1534-5351Veröffentlicht: IEEE 01.03.2009Veröffentlicht in 2009 13th European Conference on Software Maintenance and Reengineering (01.03.2009)“… The main contributions of this work are two metrics to help locate faults during a code review, and algorithms to locate buffer overflow and format string vulnerabilities in C source code …”
Volltext
Tagungsbericht -
12
Improving Software Reliability via Record and Replay
ISBN: 1392363314, 9781392363317Veröffentlicht: ProQuest Dissertations & Theses 01.01.2019“… Although sophisticated techniques are adopted for software testing, most in-production software contains latent bugs. Fixing bugs may take weeks, or even …”
Volltext
Dissertation

