Suchergebnisse - buffer-overflow vulnerability detection
-
1
BovdGFE: buffer overflow vulnerability detection based on graph feature extraction
ISSN: 0924-669X, 1573-7497Veröffentlicht: New York Springer US 01.06.2023Veröffentlicht in Applied intelligence (Dordrecht, Netherlands) (01.06.2023)“… Automatically detecting buffer overflow vulnerabilities is an important research topic in software security …”
Volltext
Journal Article -
2
Buffer Overflow Vulnerability Detection Based on Unsafe Function Invocation
ISSN: 1742-6588, 1742-6596Veröffentlicht: Bristol IOP Publishing 01.06.2020Veröffentlicht in Journal of physics. Conference series (01.06.2020)“… In order to effectively mitigate buffer vulnerabilities, we proposed a buffer overflow vulnerability detection technique based on unsafe function invocation …”
Volltext
Journal Article -
3
BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis
ISSN: 1939-0114, 1939-0122Veröffentlicht: London Hindawi 22.06.2022Veröffentlicht in Security and communication networks (22.06.2022)“… Stack buffer overflow vulnerability is a common software vulnerability that can overwrite function return addresses and hijack program control flow, causing serious system problems …”
Volltext
Journal Article -
4
Smart fuzzing method for detecting stack-based buffer overflow in binary codes
ISSN: 1751-8806, 1751-8814, 1751-8814Veröffentlicht: The Institution of Engineering and Technology 01.08.2016Veröffentlicht in IET software (01.08.2016)“… During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the computer systems …”
Volltext
Journal Article -
5
Binary Static Analysis-based Buffer Overflow Vulnerability Detection Technique using Function Prologue and Epilogue
ISSN: 2383-6318, 2383-6326Veröffentlicht: 31.10.2024Veröffentlicht in KIISE Transactions on Computing Practices (31.10.2024)Volltext
Journal Article -
6
Buffer Overflow Vulnerability Detection Based on Static Analysis-assisted Symbolic Execution
Veröffentlicht: IEEE 18.08.2023Veröffentlicht in 2023 4th International Symposium on Computer Engineering and Intelligent Communications (ISCEIC) (18.08.2023)“… Buffer overflow is a common exploitable high-risk vulnerability that can lead to arbitrary code execution, thus effective detection of buffer overflow vulnerability is of utmost importance …”
Volltext
Tagungsbericht -
7
A combinatorial approach to detecting buffer overflow vulnerabilities
ISBN: 9781424492329, 1424492327ISSN: 1530-0889Veröffentlicht: IEEE 01.06.2011Veröffentlicht in 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN) (01.06.2011)“… In this paper, we present a black-box testing approach to detecting buffer overflow vulnerabilities …”
Volltext
Tagungsbericht -
8
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Veröffentlicht: IEEE 01.06.2023Veröffentlicht in 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC) (01.06.2023)“… open-source code containing millions of functions with potential buffer overflow exploits …”
Volltext
Tagungsbericht -
9
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
ISSN: 2523-3246, 2523-3246Veröffentlicht: Singapore Springer Singapore 08.09.2020Veröffentlicht in Cybersecurity (Singapore) (08.09.2020)“… The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems …”
Volltext
Journal Article -
10
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities
ISBN: 0780382307, 9780780382305ISSN: 1542-1201Veröffentlicht: Piscataway NJ IEEE 2004Veröffentlicht in 2004 IEEE/IFIP Network Operations and Management Symposium (IEEE Cat. No.04CH37507) (2004)“… In this paper, we propose a simple solution called "Buttercup" to counter against attacks based on buffer-overflow exploits …”
Volltext
Tagungsbericht -
11
PwnMaster: Automatic Buffer Overflow and Format String Vulnerability Detection and Exploitation
ISBN: 9798350361919ISSN: 1844-7872Veröffentlicht: IEEE 16.05.2024Veröffentlicht in 2024 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR) (16.05.2024)“… Automated detection tools play a crucial role in assisting researchers to identify and rectify existing software flaws …”
Volltext
Tagungsbericht -
12
Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
Veröffentlicht: IEEE 01.03.2019Veröffentlicht in 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) (01.03.2019)“… In this paper, we propose a novel approach that detects existing buffer-overflow vulnerabilities of terminal devices via automatic static analysis (ASA …”
Volltext
Tagungsbericht -
13
Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects
ISSN: 2169-3536, 2169-3536Veröffentlicht: Piscataway IEEE 2021Veröffentlicht in IEEE access (2021)“… Nevertheless, most buffer overflow vulnerabilities are not detectable by vulnerability detection tools and static analysis tools (SATs …”
Volltext
Journal Article -
14
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
ISSN: 2331-8422Veröffentlicht: Ithaca Cornell University Library, arXiv.org 01.06.2023Veröffentlicht in arXiv.org (01.06.2023)“… open-source code containing millions of functions with potential buffer overflow exploits …”
Volltext
Paper -
15
What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability
ISSN: 2640-4265, 2640-4273Veröffentlicht: Hershey IGI Global 01.07.2018Veröffentlicht in International journal of systems and software security and protection (01.07.2018)“… Buffer overflow (BO) is a well-known and widely exploited security vulnerability …”
Volltext
Journal Article -
16
Static Analysis Method for Detecting Buffer Overflow Vulnerabilities
ISSN: 0361-7688, 1608-3261Veröffentlicht: New York Springer Nature B.V 01.07.2005Veröffentlicht in Programming and computer software (01.07.2005)“… In this paper, a new static method for automated detection of vulnerabilities that could result in buffer overflows in programs is suggested …”
Volltext
Journal Article -
17
Research on Dynamic Detection Method of Buffer Overflow Vulnerabilities Based on Complete Boundary Test
Veröffentlicht: IEEE 11.12.2020Veröffentlicht in 2020 IEEE 6th International Conference on Computer and Communications (ICCC) (11.12.2020)“… For this kind of software and its running environment, it is difficult to reduce the false positive rate and false negative rate with traditional static detection method for buffer overflow …”
Volltext
Tagungsbericht -
18
Poster: Analytical Study on Large Language Models' Detection Capability for Buffer Overflow and Integer Overflow Vulnerabilities
ISSN: 2158-9208Veröffentlicht: IEEE 10.10.2025Veröffentlicht in Proceedings of the ... International Symposium on Parallel and Distributed Processing with Applications (Print) (10.10.2025)“… However, systematic investigation of LLMs for buffer and integer overflows vulnerabilityies detection remains notably lacking …”
Volltext
Tagungsbericht -
19
A method for detecting buffer overflow vulnerabilities
ISBN: 9781612844855, 1612844855Veröffentlicht: IEEE 01.05.2011Veröffentlicht in 2011 IEEE 3rd International Conference on Communication Software and Networks (01.05.2011)“… The paper presents a method that combines static analysis with dynamic test to deal with the problem on buffer overflow vulnerabilities detecting …”
Volltext
Tagungsbericht -
20
Light-Weight Rule-Based Test Case Generation for Detecting Buffer Overflow Vulnerabilities
Veröffentlicht: IEEE 01.05.2015Veröffentlicht in 2015 IEEE/ACM 10th International Workshop on Automation of Software Test (01.05.2015)“… Despite existence of many detection solutions, buffer overflow bugs are widely being reported in multitude of applications suggesting either inherent limitations in current solutions or problems …”
Volltext
Tagungsbericht

