Suchergebnisse - buffer overflow vulnerability diagnosis

  • Treffer 1 - 12 von 12
Treffer weiter einschränken
  1. 1

    SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities von Chen, Gang, Jin, Hai, Zou, Deqing, Zhou, Bing Bing, Liang, Zhenkai, Zheng, Weide, Shi, Xuanhua

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.11.2013
    “… This paper presents SafeStack, a system that can automatically diagnose and patch stack-based buffer overflow vulnerabilities …”
    Volltext
    Journal Article
  2. 2

    Buffer overflow vulnerability diagnosis for commodity software von Zheng, Jiang

    ISBN: 9781109053999, 1109053991
    Veröffentlicht: ProQuest Dissertations & Theses 01.01.2008
    “… The existence of buffer overflow vulnerabilities makes the system susceptible to Internet worms and denial of service (DDoS …”
    Volltext
    Dissertation
  3. 3

    Memory Vulnerability Diagnosis for Binary Program von Tang, Feng-Yi, Feng, Chao, Tang, Chao-Jing

    ISSN: 2271-2097, 2431-7578, 2271-2097
    Veröffentlicht: Les Ulis EDP Sciences 2016
    Veröffentlicht in ITM web of conferences (2016)
    “… The diagnosis methods target at buffer overflow, use after free (UAF) and format string vulnerabilities …”
    Volltext
    Journal Article Tagungsbericht
  4. 4

    A fine-grained classification and security analysis of web-based virtual machine vulnerabilities von Yilmaz, Fadi, Sridhar, Meera, Mohanty, Abhinav, Tendulkar, Vasant, Hamlen, Kevin W.

    ISSN: 0167-4048, 1872-6208
    Veröffentlicht: Amsterdam Elsevier Ltd 01.06.2021
    Veröffentlicht in Computers & security (01.06.2021)
    “… The design and implementation of Inscription, the first fully automated Adobe Flash binary code transformation system that can guard major Flash vulnerability categories without modifying vulnerable …”
    Volltext
    Journal Article
  5. 5

    Exploitation Analysis of Buffer Overflow in SL-Mail Server von Shafana, N. Jeenath, Pawar, Kshitij

    ISSN: 2768-0673
    Veröffentlicht: IEEE 11.11.2021
    “… Buffer overflows are the vulnerabilities which are exploited due copying function which aren't set to be bounded …”
    Volltext
    Tagungsbericht
  6. 6

    Exploiting Control Device Vulnerabilities: Attacking Cyber-Physical Water System von Sindhwad, Parul, Kazi, Faruk

    ISSN: 2305-7254
    Veröffentlicht: FRUCT Oy 09.11.2022
    “… ), Buffer overflow, privilege escalation, and illegal command injection attacks are executed, and their impacts are investigated using CIA and STRIDE threat modeling …”
    Volltext
    Tagungsbericht
  7. 7

    LLM-Based Approach for Buffer Overflow Detection in Source Code von Kaanan, Emran, Karim, Tasmin, Hossain Shaon, Md. Shazzad, Fahim Sultan, Md, Cuzzocrea, Alfredo, Akter, Mst Shapna

    ISSN: 2474-9656
    Veröffentlicht: IEEE 20.12.2024
    Veröffentlicht in Computer and information technology (20.12.2024)
    “… One major security issue is CWE-120, which deals with buffer overflow vulnerabilities …”
    Volltext
    Tagungsbericht
  8. 8

    Reversing to detect software vulnerabilities von Goncalves de Oliveira, Bruno, Vitali, Maycon, Watanabe, Willian Massami

    Veröffentlicht: AISTI 01.06.2017
    “… Software disassembling is an interesting approach to discover vulnerabilities. Unmounting an application into Assembly code can reveal multiple characteristics from the software …”
    Volltext
    Tagungsbericht
  9. 9

    HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows von Qiang Zeng, Mingyi Zhao, Peng Liu

    ISSN: 1530-0889
    Veröffentlicht: IEEE 01.06.2015
    “… For decades buffer overflows have been one of the most prevalent and dangerous software vulnerabilities …”
    Volltext
    Tagungsbericht
  10. 10

    Improving software security with concurrent monitoring, automated diagnosis, and self-shielding von Zeng, Qiang

    ISBN: 1321578512, 9781321578515
    Veröffentlicht: ProQuest Dissertations & Theses 01.01.2014
    “… The society nowadays relies heavily on digitized information and services. Among others, cyber-security is one of the cornerstones of the digital world. The …”
    Volltext
    Dissertation
  11. 11

    Static Security Analysis Based on Input-Related Software Faults von Nagy, C., Mancoridis, S.

    ISBN: 1424437555, 0769535895, 9781424437559, 9780769535890
    ISSN: 1534-5351
    Veröffentlicht: IEEE 01.03.2009
    “… The main contributions of this work are two metrics to help locate faults during a code review, and algorithms to locate buffer overflow and format string vulnerabilities in C source code …”
    Volltext
    Tagungsbericht
  12. 12

    Improving Software Reliability via Record and Replay von Liu, Hongyu

    ISBN: 1392363314, 9781392363317
    Veröffentlicht: ProQuest Dissertations & Theses 01.01.2019
    “… Although sophisticated techniques are adopted for software testing, most in-production software contains latent bugs. Fixing bugs may take weeks, or even …”
    Volltext
    Dissertation