Search Results - (( exploiting buffer overflow ) OR ( exploring buffer overflow ))

Refine Results
  1. 1

    Exploiting stack-based buffer overflow using modern day techniques by Nicula, Ștefan, Zota, Răzvan Daniel

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2019
    Published in Procedia computer science (2019)
    “…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow…”
    Get full text
    Journal Article
  2. 2

    Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios by Hitefield, S. D., Fowler, M., Clancy, T. Charles

    Published: IEEE 01.07.2018
    “…As wireless systems are becoming more complex, there is a shift towards implementing these systems completely in software and firmware rather than hardware…”
    Get full text
    Conference Proceeding
  3. 3

    Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core by Chenet, Cristiano Pegoraro, Savino, Alessandro, Di Carlo, Stefano

    Published: IEEE 11.03.2025
    “…The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks…”
    Get full text
    Conference Proceeding
  4. 4

    Exploiting buffer overflows over Bluetooth: the BluePass tool by Gianluigi Me

    ISBN: 0780390199, 9780780390195
    ISSN: 1811-3923
    Published: IEEE 2005
    “… For this reason is not acceptable any kind of unexpected or unsafe failure. Since many embedded systems don't include a security framework and are vulnerable to buffer…”
    Get full text
    Conference Proceeding
  5. 5

    SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks by Shinagawa, T.

    ISBN: 9780769526775, 0769526772
    ISSN: 1060-9857
    Published: IEEE 01.10.2006
    “…This paper presents a strong and efficient scheme for protecting against buffer overflow attacks…”
    Get full text
    Conference Proceeding
  6. 6

    Buffer overflow and format string overflow vulnerabilities by Lhee, Kyung-Suk, Chapin, Steve J.

    ISSN: 0038-0644, 1097-024X
    Published: Chichester, UK John Wiley & Sons, Ltd 25.04.2003
    Published in Software, practice & experience (25.04.2003)
    “… This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures…”
    Get full text
    Journal Article
  7. 7

    Buffer overflow attacks : detect, exploit, prevent by Foster, James C.

    ISBN: 9781932266672, 1932266674
    Published: Rockland, Mass Syngress 2005
    “…The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer…”
    Get full text
    eBook Book
  8. 8
  9. 9

    Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation by Wang, Lanjia, Li, Zhichun, Chen, Yan, Fu, Zhi (Judy), Li, Xing

    ISSN: 1063-6692, 1558-2566
    Published: New York IEEE 01.02.2010
    Published in IEEE/ACM transactions on networking (01.02.2010)
    “… As the first step, we design a network-based length-based signature generator (LESG) for the worms exploiting buffer overflow vulnerabilities…”
    Get full text
    Journal Article
  10. 10

    ROPocop — Dynamic mitigation of code-reuse attacks by Follner, Andreas, Bodden, Eric

    ISSN: 2214-2126
    Published: Elsevier Ltd 01.08.2016
    “…Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years…”
    Get full text
    Journal Article
  11. 11

    Secure Patrol: Patrolling Against Buffer Overflow Exploits by Solanki, Jaydeep, Shah, Aenik, Das, Manik Lal

    ISSN: 1939-3555, 1939-3547
    Published: Philadelphia, PA Taylor & Francis 04.05.2014
    Published in Information security journal. (04.05.2014)
    “… Another potential actor in buffer overflow attacks is Global Offset Table (GOT); exploiting it can also lead to disastrous results, such as a call to printf…”
    Get full text
    Journal Article
  12. 12

    Exploitation Analysis of Buffer Overflow in SL-Mail Server by Shafana, N. Jeenath, Pawar, Kshitij

    ISSN: 2768-0673
    Published: IEEE 11.11.2021
    “…Buffer overflows are known as the most widely used and the oldest forms of attacks used by attackers to gain access for remote code execution and similar attacks…”
    Get full text
    Conference Proceeding
  13. 13

    Enhancing security using legality assertions by Lei Wang, Cordy, J.R., Dean, T.R.

    ISBN: 0769524745, 9780769524740
    ISSN: 1095-1350
    Published: IEEE 2005
    “…Buffer overflows have been the most common form of security vulnerability in the past decade…”
    Get full text
    Conference Proceeding
  14. 14

    Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems by Hao, Xiaochen, Lv, Mingsong, Zheng, Jiesheng, Zhang, Zhengkui, Yi, Wang

    ISSN: 2576-6996
    Published: IEEE 01.11.2019
    “… A well-known attack is ReturnOriented Programming (ROP) which can diverge the control flow of a program by exploiting the buffer overflow vulnerability…”
    Get full text
    Conference Proceeding
  15. 15

    StackOFFence: a technique for defending against buffer overflow attacks by Madan, B.B., Phoha, S., Trivedi, K.S.

    ISBN: 0769523153, 9780769523156
    Published: IEEE 2005
    “… This results in software code that is more vulnerable to security intrusions exploiting buffer overflow vulnerabilities…”
    Get full text
    Conference Proceeding
  16. 16

    Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code by McCully, Gary A., Hastings, John D., Xu, Shengjie, Fortier, Adam

    ISSN: 2768-1831
    Published: IEEE 24.04.2025
    “… To detect vulnerabilities such as buffer overflows in compiled code, this research investigates the application of unidirectional transformer-based embeddings, specifically G PT-2…”
    Get full text
    Conference Proceeding
  17. 17

    On Detecting Code Reuse Attacks by Kosolapov, Y. V.

    ISSN: 0146-4116, 1558-108X
    Published: Moscow Pleiades Publishing 01.12.2020
    Published in Automatic control and computer sciences (01.12.2020)
    “…— Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow…”
    Get full text
    Journal Article
  18. 18

    Removing architectural bottlenecks to the scalability of speculative parallelization by Prvulovic, M., Garzaran, M.J., Rauchwerger, L., Torrellas, J.

    ISBN: 0769511627, 9780769511627
    ISSN: 1063-6897
    Published: IEEE 2001
    “… The solutions that we propose are: low-complexity commit in constant time to eliminate the task commit bottleneck, a memory-based overflow area to eliminate stall due to speculative buffer overflow, and exploiting high-level access…”
    Get full text
    Conference Proceeding
  19. 19

    Automatic Exploit Generation for Buffer Overflow Vulnerabilities by Xu, Luhang, Jia, Weixi, Dong, Wei, Li, Yongjun

    Published: IEEE 01.07.2018
    “…Buffer overflow vulnerabilities are widely found in software. Finding these vulnerabilities and identifying whether these vulnerabilities can be exploit is very important…”
    Get full text
    Conference Proceeding
  20. 20

    Cross-layer adaptive transmission with incomplete system state information by Anh Tuan Hoang, Motani, M.

    ISSN: 0090-6778, 1558-0857
    Published: New York, NY IEEE 01.11.2008
    Published in IEEE transactions on communications (01.11.2008)
    “… Data packets are subject to loss due to buffer overflow and transmission errors. We study the problem of adapting the transmit power and rate based on the buffer…”
    Get full text
    Journal Article