Suchergebnisse - stack buffer overflow attack

  1. 1

    RS-Stack: Defense against Stack Buffer Overflow Attack with Random Shadow Stack von Hongwei, Zhou, Zhipeng, Ke, Yuchen, Zhang, Ruichao, Guo, Shengsheng, Li, Jinhui, Yuan

    Veröffentlicht: IEEE 28.10.2022
    “… Shadow stack is a method to prevent stack buffer overflow attack. However, in the existing shadow stack solutions, it is often supposed that the shadow stack is safe, but the reality is not always the case …”
    Volltext
    Tagungsbericht
  2. 2

    Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE von Shiba, Kaito, Kuzuno, Hiroki, Yamauchi, Toshihiro

    ISSN: 2832-1324
    Veröffentlicht: IEEE 27.11.2023
    “… We also propose a method for preventing attacks that exploit stack buffer overflows in TA command calls …”
    Volltext
    Tagungsbericht
  3. 3

    Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core von Chenet, Cristiano Pegoraro, Savino, Alessandro, Di Carlo, Stefano

    Veröffentlicht: IEEE 11.03.2025
    Veröffentlicht in 2025 IEEE 26th Latin American Test Symposium (LATS) (11.03.2025)
    “… The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks …”
    Volltext
    Tagungsbericht
  4. 4

    HardStack: Prevent Stack Buffer Overflow Attack with LBR von Zhou, Hongwei, Kang, Keda, Yuan, Jinhui

    Veröffentlicht: IEEE 01.12.2019
    “… Stack buffer overflow attack can temper with software control flow by continuously injecting data into stack and overwriting function return address …”
    Volltext
    Tagungsbericht
  5. 5

    Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks von Park, Y.-J., Zhang, Z., Lee, G.

    ISSN: 0272-1732, 1937-4143
    Veröffentlicht: Los Alamitos IEEE 01.07.2006
    Veröffentlicht in IEEE MICRO (01.07.2006)
    “… A microarchitecture-based, software-transparent mechanism offers protection against stack-based buffer overflow attacks with moderate hardware cost and negligible performance …”
    Volltext
    Journal Article
  6. 6

    Nile: A Programmable Monitoring Coprocessor von Delshadtehrani, Leila, Eldridge, Schuyler, Canakci, Sadullah, Egele, Manuel, Joshi, Ajay

    ISSN: 1556-6056, 1556-6064
    Veröffentlicht: New York IEEE 01.01.2018
    Veröffentlicht in IEEE computer architecture letters (01.01.2018)
    “… Researchers widely employ hardware performance counters (HPCs) as well as debugging and profiling tools in processors for monitoring different events such as …”
    Volltext
    Journal Article
  7. 7

    Hardware-based stack buffer overflow attack detection on RISC-V architectures von Cristiano Pegoraro Chenet, Zhang, Ziteng, Savino, Alessandro, Stefano Di Carlo

    ISSN: 2331-8422
    Veröffentlicht: Ithaca Cornell University Library, arXiv.org 12.06.2024
    Veröffentlicht in arXiv.org (12.06.2024)
    “… This work evaluates how well hardware-based approaches detect stack buffer overflow (SBO …”
    Volltext
    Paper
  8. 8
  9. 9

    An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks von Sah, Love Kumar, Islam, Sheikh Ariful, Katkoori, Srinivas

    Veröffentlicht: IEEE 01.12.2018
    “… With such overhead, the defender can use software-only approaches only to the debugging context. In this paper, we present a novel hardware approach to detect stack based buffer overflow attack during runtime …”
    Volltext
    Tagungsbericht
  10. 10

    Secure Patrol: Patrolling Against Buffer Overflow Exploits von Solanki, Jaydeep, Shah, Aenik, Das, Manik Lal

    ISSN: 1939-3555, 1939-3547
    Veröffentlicht: Philadelphia, PA Taylor & Francis 04.05.2014
    Veröffentlicht in Information security journal. (04.05.2014)
    “… Buffer overflow attacks are caused due to exploitation of stack or heap in computer memory …”
    Volltext
    Journal Article
  11. 11

    Massachusetts Inventor Develops Stack Buffer Overflow Attack Preventing Method

    Veröffentlicht: Washington, D.C HT Digital Streams Limited 03.08.2006
    Veröffentlicht in US Fed News Service, Including US State News (03.08.2006)
    Volltext
    Newsletter
  12. 12

    To Detect Stack Buffer Overflow with Polymorphic Canaries von Wang, Zhilong, Ding, Xuhua, Pang, Chengbin, Guo, Jian, Zhu, Jun, Mao, Bing

    ISSN: 2158-3927
    Veröffentlicht: IEEE 01.06.2018
    “… Stack Smashing Protection (SSP) is a simple and highly efficient technique widely used in practice as the front line defense against stack buffer overflow attacks …”
    Volltext
    Tagungsbericht
  13. 13

    A Fine-Grained Control Flow Integrity Approach Against Runtime Memory Attacks for Embedded Systems von Das, Sanjeev, Wei Zhang, Yang Liu

    ISSN: 1063-8210, 1557-9999
    Veröffentlicht: New York IEEE 01.11.2016
    “… Runtime attacks on memory, such as buffer overflow based stack smashing and code reuse attacks, are common in embedded systems …”
    Volltext
    Journal Article
  14. 14

    Guided Learning and Interactive Visualization for Teaching & Learning Stack Smashing Attacks & Defenses: Experiences and Evaluation von Ramaprasad, Harini, Sridhar, Meera, Dangeti, Sushma I, Pradhan, Soham, Obaidat, Islam

    ISSN: 2377-634X
    Veröffentlicht: IEEE 13.10.2024
    Veröffentlicht in Proceedings - Frontiers in Education Conference (13.10.2024)
    “… Widely ubiquitous buffer overflow vul-nerabilities and stack smashing attacks that exploit them are critical components in advanced software security curricula, since buffer overflows can arise due …”
    Volltext
    Tagungsbericht
  15. 15

    Preventing buffer overflow attacks using Binary of Split Stack (BoSS) von Doshi, Parag Nileshbhai

    ISBN: 0549352244, 9780549352242
    Veröffentlicht: ProQuest Dissertations & Theses 01.01.2007
    “… Key idea in buffer overflow attack is to overrun any buffer stored on the local stack and overwrite the control flow information like return address of the current function …”
    Volltext
    Dissertation
  16. 16

    Variable Record Table: A Run-time Solution for Mitigating Buffer Overflow Attack von Sah, Love Kumar, Ariful Islam, Sheikh, Katkoori, Srinivas

    ISSN: 1558-3899
    Veröffentlicht: IEEE 01.08.2019
    “… We present a novel approach to mitigate buffer overflow attack using Variable Record Table (VRT …”
    Volltext
    Tagungsbericht
  17. 17

    Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems von Leon, Erick, Bruda, Stefan D.

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2016
    Veröffentlicht in Procedia computer science (2016)
    “… We address the particular cyber attack technique known as stack buffer overflow in GNU/Linux operating systems, which are widely used in HPC environments …”
    Volltext
    Journal Article
  18. 18

    SSPFA: effective stack smashing protection for Android OS von Marco-Gisbert, Héctor, Ripoll-Ripoll, Ismael

    ISSN: 1615-5262, 1615-5270
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2019
    Veröffentlicht in International journal of information security (01.08.2019)
    “… In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails …”
    Volltext
    Journal Article
  19. 19

    A New Class of Buffer Overflow Attacks von Kundu, A., Bertino, E.

    ISBN: 1612843840, 9781612843841
    ISSN: 1063-6927
    Veröffentlicht: IEEE 01.06.2011
    “… Such overflows can lead to stack as well as heap/data/bss overflows, which can be exploited by attackers in order to carry out the entire range of attacks associated with buffer overflow …”
    Volltext
    Tagungsbericht
  20. 20

    RISC-V Based Secure Processor Architecture for Return Address Protection von Sharma, Lalit, Goel, Neeraj

    ISSN: 2380-6923
    Veröffentlicht: IEEE 04.01.2025
    Veröffentlicht in VLSI design (04.01.2025)
    “… Buffer over-flow (BFO) attacks, specifically on Stack, can alter the program execution flow and are extensively employed by attackers …”
    Volltext
    Tagungsbericht