Search Results - Stack buffer overflow

Refine Results
  1. 1

    SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities by Chen, Gang, Jin, Hai, Zou, Deqing, Zhou, Bing Bing, Liang, Zhenkai, Zheng, Weide, Shi, Xuanhua

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.11.2013
    “… This paper presents SafeStack, a system that can automatically diagnose and patch stack-based buffer overflow vulnerabilities…”
    Get full text
    Journal Article
  2. 2

    Smart fuzzing method for detecting stack-based buffer overflow in binary codes by Mouzarani, Maryam, Sadeghiyan, Babak, Zolfaghari, Mohammad

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Published: The Institution of Engineering and Technology 01.08.2016
    Published in IET software (01.08.2016)
    “…During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the computer systems…”
    Get full text
    Journal Article
  3. 3

    RS-Stack: Defense against Stack Buffer Overflow Attack with Random Shadow Stack by Hongwei, Zhou, Zhipeng, Ke, Yuchen, Zhang, Ruichao, Guo, Shengsheng, Li, Jinhui, Yuan

    Published: IEEE 28.10.2022
    “…Shadow stack is a method to prevent stack buffer overflow attack. However, in the existing shadow stack solutions, it is often supposed that the shadow stack is safe, but the reality is not always the case…”
    Get full text
    Conference Proceeding
  4. 4

    BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis by Xu, Shenglin, Wang, Yongjun

    ISSN: 1939-0114, 1939-0122
    Published: London Hindawi 22.06.2022
    Published in Security and communication networks (22.06.2022)
    “…Stack buffer overflow vulnerability is a common software vulnerability that can overwrite function return addresses and hijack program control flow, causing serious system problems…”
    Get full text
    Journal Article
  5. 5

    To Detect Stack Buffer Overflow with Polymorphic Canaries by Wang, Zhilong, Ding, Xuhua, Pang, Chengbin, Guo, Jian, Zhu, Jun, Mao, Bing

    ISSN: 2158-3927
    Published: IEEE 01.06.2018
    “…Stack Smashing Protection (SSP) is a simple and highly efficient technique widely used in practice as the front line defense against stack buffer overflow attacks…”
    Get full text
    Conference Proceeding
  6. 6

    Exploiting stack-based buffer overflow using modern day techniques by Nicula, Ștefan, Zota, Răzvan Daniel

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2019
    Published in Procedia computer science (2019)
    “…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow…”
    Get full text
    Journal Article
  7. 7

    Automated exploit generation for stack buffer overflow vulnerabilities by Padaryan, V. A., Kaushan, V. V., Fedotov, A. N.

    ISSN: 0361-7688, 1608-3261
    Published: Moscow Pleiades Publishing 01.11.2015
    Published in Programming and computer software (01.11.2015)
    “…An automated method for exploit generation is presented. This method allows one to construct exploits for stack buffer overflow vulnerabilities and to prioritize software bugs…”
    Get full text
    Journal Article
  8. 8

    Automated exploit generation method for stack buffer overflow vulnerabilities by Padaryan, V.A., Kaushan, V.V., Fedotov, A.N.

    ISSN: 2079-8156, 2220-6426
    Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018
    “…In this paper automated method for exploit generation is presented. This method allows to construct exploits for stack buffer overflow vulnerabilities and also to prioritize software bugs…”
    Get full text
    Journal Article
  9. 9

    Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems by Leon, Erick, Bruda, Stefan D.

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2016
    Published in Procedia computer science (2016)
    “…We address the particular cyber attack technique known as stack buffer overflow in GNU/Linux operating systems, which are widely used in HPC environments…”
    Get full text
    Journal Article
  10. 10

    On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer Overflows by Gisbert, Hector Marco, Ripoll, Ismael

    Published: IEEE 01.08.2014
    “… This paper assess the effectiveness of these techniques against stack buffer overflow exploitation…”
    Get full text
    Conference Proceeding
  11. 11

    Window Canaries: Re-thinking Stack Canaries for Architectures with Register Windows by Lehniger, Kai, Langendorfer, Peter

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.11.2023
    “… The approach offers low performance overhead while guaranteeing that return addresses are protected by stack buffer overflows without relying on a heuristic that decides which functions to instrument…”
    Get full text
    Journal Article
  12. 12

    StackSpecter: Detecting Stack Buffer Overflows for the Xtensa Architecture by Lehniger, Kai, Langendorfer, Peter

    ISSN: 2474-154X
    Published: IEEE 27.11.2024
    “…This paper presents a new approach, StackSpecter, for stack buffer overflow detection, specifically for architectures with register windows…”
    Get full text
    Conference Proceeding
  13. 13

    Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core by Chenet, Cristiano Pegoraro, Savino, Alessandro, Di Carlo, Stefano

    Published: IEEE 11.03.2025
    “…The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks…”
    Get full text
    Conference Proceeding
  14. 14

    Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE by Shiba, Kaito, Kuzuno, Hiroki, Yamauchi, Toshihiro

    ISSN: 2832-1324
    Published: IEEE 27.11.2023
    “… In this study, we investigate the security features applied to trusted applications (TA) in OP-TEE and clarify the lack of protection against stack buffer overflow in TA command calls…”
    Get full text
    Conference Proceeding
  15. 15

    Stack Memory Buffer Overflow Protection based on Duplication and Randomization by Alouneh, Sahel, Kharbutli, Mazen, AlQurem, Rana

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2013
    Published in Procedia computer science (2013)
    “… Vulnerabilities in the program's stack are commonly exploited by attackers in the form of stack-based attacks…”
    Get full text
    Journal Article
  16. 16

    Buffer/Stack Overflow by Khawaja, Gus

    ISBN: 9781119719083, 1119719089
    Published: United States John Wiley & Sons, Incorporated 2021
    Get full text
    Book Chapter
  17. 17

    HardStack: Prevent Stack Buffer Overflow Attack with LBR by Zhou, Hongwei, Kang, Keda, Yuan, Jinhui

    Published: IEEE 01.12.2019
    “…Stack buffer overflow attack can temper with software control flow by continuously injecting data into stack and overwriting function return address…”
    Get full text
    Conference Proceeding
  18. 18

    Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks by Park, Y.-J., Zhang, Z., Lee, G.

    ISSN: 0272-1732, 1937-4143
    Published: Los Alamitos IEEE 01.07.2006
    Published in IEEE MICRO (01.07.2006)
    “… A microarchitecture-based, software-transparent mechanism offers protection against stack-based buffer overflow attacks with moderate hardware cost and negligible performance…”
    Get full text
    Journal Article
  19. 19

    Nile: A Programmable Monitoring Coprocessor by Delshadtehrani, Leila, Eldridge, Schuyler, Canakci, Sadullah, Egele, Manuel, Joshi, Ajay

    ISSN: 1556-6056, 1556-6064
    Published: New York IEEE 01.01.2018
    Published in IEEE computer architecture letters (01.01.2018)
    “…Researchers widely employ hardware performance counters (HPCs) as well as debugging and profiling tools in processors for monitoring different events such as…”
    Get full text
    Journal Article
  20. 20

    Hardware-based stack buffer overflow attack detection on RISC-V architectures by Cristiano Pegoraro Chenet, Zhang, Ziteng, Savino, Alessandro, Stefano Di Carlo

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 12.06.2024
    Published in arXiv.org (12.06.2024)
    “…This work evaluates how well hardware-based approaches detect stack buffer overflow (SBO…”
    Get full text
    Paper