Search Results - stack buffer overflow attack

Refine Results
  1. 1

    RS-Stack: Defense against Stack Buffer Overflow Attack with Random Shadow Stack by Hongwei, Zhou, Zhipeng, Ke, Yuchen, Zhang, Ruichao, Guo, Shengsheng, Li, Jinhui, Yuan

    Published: IEEE 28.10.2022
    “…Shadow stack is a method to prevent stack buffer overflow attack. However, in the existing shadow stack solutions, it is often supposed that the shadow stack is safe, but the reality is not always the case…”
    Get full text
    Conference Proceeding
  2. 2

    Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE by Shiba, Kaito, Kuzuno, Hiroki, Yamauchi, Toshihiro

    ISSN: 2832-1324
    Published: IEEE 27.11.2023
    “… We also propose a method for preventing attacks that exploit stack buffer overflows in TA command calls…”
    Get full text
    Conference Proceeding
  3. 3

    Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core by Chenet, Cristiano Pegoraro, Savino, Alessandro, Di Carlo, Stefano

    Published: IEEE 11.03.2025
    “…The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks…”
    Get full text
    Conference Proceeding
  4. 4

    HardStack: Prevent Stack Buffer Overflow Attack with LBR by Zhou, Hongwei, Kang, Keda, Yuan, Jinhui

    Published: IEEE 01.12.2019
    “…Stack buffer overflow attack can temper with software control flow by continuously injecting data into stack and overwriting function return address…”
    Get full text
    Conference Proceeding
  5. 5

    Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks by Park, Y.-J., Zhang, Z., Lee, G.

    ISSN: 0272-1732, 1937-4143
    Published: Los Alamitos IEEE 01.07.2006
    Published in IEEE MICRO (01.07.2006)
    “… A microarchitecture-based, software-transparent mechanism offers protection against stack-based buffer overflow attacks with moderate hardware cost and negligible performance…”
    Get full text
    Journal Article
  6. 6

    Nile: A Programmable Monitoring Coprocessor by Delshadtehrani, Leila, Eldridge, Schuyler, Canakci, Sadullah, Egele, Manuel, Joshi, Ajay

    ISSN: 1556-6056, 1556-6064
    Published: New York IEEE 01.01.2018
    Published in IEEE computer architecture letters (01.01.2018)
    “…Researchers widely employ hardware performance counters (HPCs) as well as debugging and profiling tools in processors for monitoring different events such as…”
    Get full text
    Journal Article
  7. 7

    Hardware-based stack buffer overflow attack detection on RISC-V architectures by Cristiano Pegoraro Chenet, Zhang, Ziteng, Savino, Alessandro, Stefano Di Carlo

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 12.06.2024
    Published in arXiv.org (12.06.2024)
    “…This work evaluates how well hardware-based approaches detect stack buffer overflow (SBO…”
    Get full text
    Paper
  8. 8
  9. 9

    An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks by Sah, Love Kumar, Islam, Sheikh Ariful, Katkoori, Srinivas

    Published: IEEE 01.12.2018
    “… With such overhead, the defender can use software-only approaches only to the debugging context. In this paper, we present a novel hardware approach to detect stack based buffer overflow attack during runtime…”
    Get full text
    Conference Proceeding
  10. 10

    Secure Patrol: Patrolling Against Buffer Overflow Exploits by Solanki, Jaydeep, Shah, Aenik, Das, Manik Lal

    ISSN: 1939-3555, 1939-3547
    Published: Philadelphia, PA Taylor & Francis 04.05.2014
    Published in Information security journal. (04.05.2014)
    “…Buffer overflow attacks are caused due to exploitation of stack or heap in computer memory…”
    Get full text
    Journal Article
  11. 11

    Massachusetts Inventor Develops Stack Buffer Overflow Attack Preventing Method

    Published: Washington, D.C HT Digital Streams Limited 03.08.2006
    Get full text
    Newsletter
  12. 12

    To Detect Stack Buffer Overflow with Polymorphic Canaries by Wang, Zhilong, Ding, Xuhua, Pang, Chengbin, Guo, Jian, Zhu, Jun, Mao, Bing

    ISSN: 2158-3927
    Published: IEEE 01.06.2018
    “…Stack Smashing Protection (SSP) is a simple and highly efficient technique widely used in practice as the front line defense against stack buffer overflow attacks…”
    Get full text
    Conference Proceeding
  13. 13

    A Fine-Grained Control Flow Integrity Approach Against Runtime Memory Attacks for Embedded Systems by Das, Sanjeev, Wei Zhang, Yang Liu

    ISSN: 1063-8210, 1557-9999
    Published: New York IEEE 01.11.2016
    “…Runtime attacks on memory, such as buffer overflow based stack smashing and code reuse attacks, are common in embedded systems…”
    Get full text
    Journal Article
  14. 14

    Guided Learning and Interactive Visualization for Teaching & Learning Stack Smashing Attacks & Defenses: Experiences and Evaluation by Ramaprasad, Harini, Sridhar, Meera, Dangeti, Sushma I, Pradhan, Soham, Obaidat, Islam

    ISSN: 2377-634X
    Published: IEEE 13.10.2024
    “… Widely ubiquitous buffer overflow vul-nerabilities and stack smashing attacks that exploit them are critical components in advanced software security curricula, since buffer overflows can arise due…”
    Get full text
    Conference Proceeding
  15. 15

    Preventing buffer overflow attacks using Binary of Split Stack (BoSS) by Doshi, Parag Nileshbhai

    ISBN: 0549352244, 9780549352242
    Published: ProQuest Dissertations & Theses 01.01.2007
    “… Key idea in buffer overflow attack is to overrun any buffer stored on the local stack and overwrite the control flow information like return address of the current function…”
    Get full text
    Dissertation
  16. 16

    Variable Record Table: A Run-time Solution for Mitigating Buffer Overflow Attack by Sah, Love Kumar, Ariful Islam, Sheikh, Katkoori, Srinivas

    ISSN: 1558-3899
    Published: IEEE 01.08.2019
    “…We present a novel approach to mitigate buffer overflow attack using Variable Record Table (VRT…”
    Get full text
    Conference Proceeding
  17. 17

    Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems by Leon, Erick, Bruda, Stefan D.

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2016
    Published in Procedia computer science (2016)
    “…We address the particular cyber attack technique known as stack buffer overflow in GNU/Linux operating systems, which are widely used in HPC environments…”
    Get full text
    Journal Article
  18. 18

    SSPFA: effective stack smashing protection for Android OS by Marco-Gisbert, Héctor, Ripoll-Ripoll, Ismael

    ISSN: 1615-5262, 1615-5270
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2019
    “…In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails…”
    Get full text
    Journal Article
  19. 19

    A New Class of Buffer Overflow Attacks by Kundu, A., Bertino, E.

    ISBN: 1612843840, 9781612843841
    ISSN: 1063-6927
    Published: IEEE 01.06.2011
    “… Such overflows can lead to stack as well as heap/data/bss overflows, which can be exploited by attackers in order to carry out the entire range of attacks associated with buffer overflow…”
    Get full text
    Conference Proceeding
  20. 20

    RISC-V Based Secure Processor Architecture for Return Address Protection by Sharma, Lalit, Goel, Neeraj

    ISSN: 2380-6923
    Published: IEEE 04.01.2025
    Published in VLSI design (04.01.2025)
    “… Buffer over-flow (BFO) attacks, specifically on Stack, can alter the program execution flow and are extensively employed by attackers…”
    Get full text
    Conference Proceeding