Suchergebnisse - buffer-overflow vulnerability detection

  1. 1

    BovdGFE: buffer overflow vulnerability detection based on graph feature extraction von Lv, Xinghang, Peng, Tao, Chen, Jia, Liu, Junping, Hu, Xinrong, He, Ruhan, Jiang, Minghua, Cao, Wenli

    ISSN: 0924-669X, 1573-7497
    Veröffentlicht: New York Springer US 01.06.2023
    Veröffentlicht in Applied intelligence (Dordrecht, Netherlands) (01.06.2023)
    “… Automatically detecting buffer overflow vulnerabilities is an important research topic in software security …”
    Volltext
    Journal Article
  2. 2

    Buffer Overflow Vulnerability Detection Based on Unsafe Function Invocation von Zhao, Xianda, Huang, Shuguang, Pan, Zulie, Hui, Huang

    ISSN: 1742-6588, 1742-6596
    Veröffentlicht: Bristol IOP Publishing 01.06.2020
    Veröffentlicht in Journal of physics. Conference series (01.06.2020)
    “… In order to effectively mitigate buffer vulnerabilities, we proposed a buffer overflow vulnerability detection technique based on unsafe function invocation …”
    Volltext
    Journal Article
  3. 3

    BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis von Xu, Shenglin, Wang, Yongjun

    ISSN: 1939-0114, 1939-0122
    Veröffentlicht: London Hindawi 22.06.2022
    Veröffentlicht in Security and communication networks (22.06.2022)
    “… Stack buffer overflow vulnerability is a common software vulnerability that can overwrite function return addresses and hijack program control flow, causing serious system problems …”
    Volltext
    Journal Article
  4. 4

    Smart fuzzing method for detecting stack-based buffer overflow in binary codes von Mouzarani, Maryam, Sadeghiyan, Babak, Zolfaghari, Mohammad

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Veröffentlicht: The Institution of Engineering and Technology 01.08.2016
    Veröffentlicht in IET software (01.08.2016)
    “… During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the computer systems …”
    Volltext
    Journal Article
  5. 5
  6. 6

    Buffer Overflow Vulnerability Detection Based on Static Analysis-assisted Symbolic Execution von Wang, Wenhui, Zhwng, PEngland, Wei, Guichen, Ge, Zhenwei, Qin, Zhongyuan, Sun, Xin

    Veröffentlicht: IEEE 18.08.2023
    “… Buffer overflow is a common exploitable high-risk vulnerability that can lead to arbitrary code execution, thus effective detection of buffer overflow vulnerability is of utmost importance …”
    Volltext
    Tagungsbericht
  7. 7

    A combinatorial approach to detecting buffer overflow vulnerabilities von Wenhua Wang, Yu Lei, Donggang Liu, Kung, D., Csallner, C., Dazhi Zhang, Kacker, R., Kuhn, R.

    ISBN: 9781424492329, 1424492327
    ISSN: 1530-0889
    Veröffentlicht: IEEE 01.06.2011
    “… In this paper, we present a black-box testing approach to detecting buffer overflow vulnerabilities …”
    Volltext
    Tagungsbericht
  8. 8
  9. 9

    ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis von Xu, Lili, Xu, Mingjie, Li, Feng, Huo, Wei

    ISSN: 2523-3246, 2523-3246
    Veröffentlicht: Singapore Springer Singapore 08.09.2020
    Veröffentlicht in Cybersecurity (Singapore) (08.09.2020)
    “… The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems …”
    Volltext
    Journal Article
  10. 10

    Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities von Pasupulati, A., Coit, J., Levitt, K., Wu, S.F., Li, S.H., Kuo, J.C., Fan, K.P.

    ISBN: 0780382307, 9780780382305
    ISSN: 1542-1201
    Veröffentlicht: Piscataway NJ IEEE 2004
    “… In this paper, we propose a simple solution called "Buttercup" to counter against attacks based on buffer-overflow exploits …”
    Volltext
    Tagungsbericht
  11. 11

    PwnMaster: Automatic Buffer Overflow and Format String Vulnerability Detection and Exploitation von Petrean, Florin, Colesa, Adrian

    ISBN: 9798350361919
    ISSN: 1844-7872
    Veröffentlicht: IEEE 16.05.2024
    “… Automated detection tools play a crucial role in assisting researchers to identify and rectify existing software flaws …”
    Volltext
    Tagungsbericht
  12. 12

    Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis von Ying, Huan, Zhang, Yanmiao, Han, Lifang, Cheng, Yushi, Li, Jiyuan, Ji, Xiaoyu, Xu, Wenyuan

    Veröffentlicht: IEEE 01.03.2019
    “… In this paper, we propose a novel approach that detects existing buffer-overflow vulnerabilities of terminal devices via automatic static analysis (ASA …”
    Volltext
    Tagungsbericht
  13. 13

    Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects von Pereira, Jose D'Abruzzo, Ivaki, Naghmeh, Vieira, Marco

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2021
    Veröffentlicht in IEEE access (2021)
    “… Nevertheless, most buffer overflow vulnerabilities are not detectable by vulnerability detection tools and static analysis tools (SATs …”
    Volltext
    Journal Article
  14. 14

    Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks von Akter, Mst Shapna, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Cuzzocrea, Alfredo

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 01.06.2023
    Veröffentlicht in arXiv.org (01.06.2023)
    “… open-source code containing millions of functions with potential buffer overflow exploits …”
    Volltext
    Paper
  15. 15

    What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability von Cruzes, Daniela Soares, Chaim, Marcos Lordello, Santos, Daniel Soares

    ISSN: 2640-4265, 2640-4273
    Veröffentlicht: Hershey IGI Global 01.07.2018
    “… Buffer overflow (BO) is a well-known and widely exploited security vulnerability …”
    Volltext
    Journal Article
  16. 16

    Static Analysis Method for Detecting Buffer Overflow Vulnerabilities von Puchkov, F. M., Shapchenko, K. A.

    ISSN: 0361-7688, 1608-3261
    Veröffentlicht: New York Springer Nature B.V 01.07.2005
    Veröffentlicht in Programming and computer software (01.07.2005)
    “… In this paper, a new static method for automated detection of vulnerabilities that could result in buffer overflows in programs is suggested …”
    Volltext
    Journal Article
  17. 17

    Research on Dynamic Detection Method of Buffer Overflow Vulnerabilities Based on Complete Boundary Test von Li, Zesong, Yang, Hui, Ge, Junwei, Yu, Qinyong

    Veröffentlicht: IEEE 11.12.2020
    “… For this kind of software and its running environment, it is difficult to reduce the false positive rate and false negative rate with traditional static detection method for buffer overflow …”
    Volltext
    Tagungsbericht
  18. 18

    Poster: Analytical Study on Large Language Models' Detection Capability for Buffer Overflow and Integer Overflow Vulnerabilities von Cao, Xiaohong, Xie, Wanling, Zhang, Yu, Xue, Caixia, Shi, Lin, Zhang, Huajun

    ISSN: 2158-9208
    Veröffentlicht: IEEE 10.10.2025
    “… However, systematic investigation of LLMs for buffer and integer overflows vulnerabilityies detection remains notably lacking …”
    Volltext
    Tagungsbericht
  19. 19

    A method for detecting buffer overflow vulnerabilities von Jingbo Yuan, Shunli Ding

    ISBN: 9781612844855, 1612844855
    Veröffentlicht: IEEE 01.05.2011
    “… The paper presents a method that combines static analysis with dynamic test to deal with the problem on buffer overflow vulnerabilities detecting …”
    Volltext
    Tagungsbericht
  20. 20

    Light-Weight Rule-Based Test Case Generation for Detecting Buffer Overflow Vulnerabilities von Padmanabhuni, Bindu Madhavi, Kuan Tan, Hee Beng

    Veröffentlicht: IEEE 01.05.2015
    “… Despite existence of many detection solutions, buffer overflow bugs are widely being reported in multitude of applications suggesting either inherent limitations in current solutions or problems …”
    Volltext
    Tagungsbericht