Search Results - stack buffer overflow attack
-
1
RS-Stack: Defense against Stack Buffer Overflow Attack with Random Shadow Stack
Published: IEEE 28.10.2022Published in 2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA) (28.10.2022)“…Shadow stack is a method to prevent stack buffer overflow attack. However, in the existing shadow stack solutions, it is often supposed that the shadow stack is safe, but the reality is not always the case…”
Get full text
Conference Proceeding -
2
Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE
ISSN: 2832-1324Published: IEEE 27.11.2023Published in International Symposium on Computing and Networking Workshops (Online) (27.11.2023)“… We also propose a method for preventing attacks that exploit stack buffer overflows in TA command calls…”
Get full text
Conference Proceeding -
3
Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core
Published: IEEE 11.03.2025Published in 2025 IEEE 26th Latin American Test Symposium (LATS) (11.03.2025)“…The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks…”
Get full text
Conference Proceeding -
4
HardStack: Prevent Stack Buffer Overflow Attack with LBR
Published: IEEE 01.12.2019Published in 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) (01.12.2019)“…Stack buffer overflow attack can temper with software control flow by continuously injecting data into stack and overwriting function return address…”
Get full text
Conference Proceeding -
5
Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks
ISSN: 0272-1732, 1937-4143Published: Los Alamitos IEEE 01.07.2006Published in IEEE MICRO (01.07.2006)“… A microarchitecture-based, software-transparent mechanism offers protection against stack-based buffer overflow attacks with moderate hardware cost and negligible performance…”
Get full text
Journal Article -
6
Nile: A Programmable Monitoring Coprocessor
ISSN: 1556-6056, 1556-6064Published: New York IEEE 01.01.2018Published in IEEE computer architecture letters (01.01.2018)“…Researchers widely employ hardware performance counters (HPCs) as well as debugging and profiling tools in processors for monitoring different events such as…”
Get full text
Journal Article -
7
Hardware-based stack buffer overflow attack detection on RISC-V architectures
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 12.06.2024Published in arXiv.org (12.06.2024)“…This work evaluates how well hardware-based approaches detect stack buffer overflow (SBO…”
Get full text
Paper -
8
ShadowStack: A new approach for secure program execution
ISSN: 0026-2714Published: 01.08.2015Published in Microelectronics and reliability (01.08.2015)Get full text
Journal Article -
9
An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks
Published: IEEE 01.12.2018Published in 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) (01.12.2018)“… With such overhead, the defender can use software-only approaches only to the debugging context. In this paper, we present a novel hardware approach to detect stack based buffer overflow attack during runtime…”
Get full text
Conference Proceeding -
10
Secure Patrol: Patrolling Against Buffer Overflow Exploits
ISSN: 1939-3555, 1939-3547Published: Philadelphia, PA Taylor & Francis 04.05.2014Published in Information security journal. (04.05.2014)“…Buffer overflow attacks are caused due to exploitation of stack or heap in computer memory…”
Get full text
Journal Article -
11
Massachusetts Inventor Develops Stack Buffer Overflow Attack Preventing Method
Published: Washington, D.C HT Digital Streams Limited 03.08.2006Published in US Fed News Service, Including US State News (03.08.2006)Get full text
Newsletter -
12
To Detect Stack Buffer Overflow with Polymorphic Canaries
ISSN: 2158-3927Published: IEEE 01.06.2018Published in Proceedings - International Conference on Dependable Systems and Networks (01.06.2018)“…Stack Smashing Protection (SSP) is a simple and highly efficient technique widely used in practice as the front line defense against stack buffer overflow attacks…”
Get full text
Conference Proceeding -
13
A Fine-Grained Control Flow Integrity Approach Against Runtime Memory Attacks for Embedded Systems
ISSN: 1063-8210, 1557-9999Published: New York IEEE 01.11.2016Published in IEEE transactions on very large scale integration (VLSI) systems (01.11.2016)“…Runtime attacks on memory, such as buffer overflow based stack smashing and code reuse attacks, are common in embedded systems…”
Get full text
Journal Article -
14
Guided Learning and Interactive Visualization for Teaching & Learning Stack Smashing Attacks & Defenses: Experiences and Evaluation
ISSN: 2377-634XPublished: IEEE 13.10.2024Published in Proceedings - Frontiers in Education Conference (13.10.2024)“… Widely ubiquitous buffer overflow vul-nerabilities and stack smashing attacks that exploit them are critical components in advanced software security curricula, since buffer overflows can arise due…”
Get full text
Conference Proceeding -
15
Preventing buffer overflow attacks using Binary of Split Stack (BoSS)
ISBN: 0549352244, 9780549352242Published: ProQuest Dissertations & Theses 01.01.2007“… Key idea in buffer overflow attack is to overrun any buffer stored on the local stack and overwrite the control flow information like return address of the current function…”
Get full text
Dissertation -
16
Variable Record Table: A Run-time Solution for Mitigating Buffer Overflow Attack
ISSN: 1558-3899Published: IEEE 01.08.2019Published in Conference proceedings : Midwest Symposium on Circuits and Systems (01.08.2019)“…We present a novel approach to mitigate buffer overflow attack using Variable Record Table (VRT…”
Get full text
Conference Proceeding -
17
Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems
ISSN: 1877-0509, 1877-0509Published: Elsevier B.V 2016Published in Procedia computer science (2016)“…We address the particular cyber attack technique known as stack buffer overflow in GNU/Linux operating systems, which are widely used in HPC environments…”
Get full text
Journal Article -
18
SSPFA: effective stack smashing protection for Android OS
ISSN: 1615-5262, 1615-5270Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2019Published in International journal of information security (01.08.2019)“…In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails…”
Get full text
Journal Article -
19
A New Class of Buffer Overflow Attacks
ISBN: 1612843840, 9781612843841ISSN: 1063-6927Published: IEEE 01.06.2011Published in 2011 31st International Conference on Distributed Computing Systems (01.06.2011)“… Such overflows can lead to stack as well as heap/data/bss overflows, which can be exploited by attackers in order to carry out the entire range of attacks associated with buffer overflow…”
Get full text
Conference Proceeding -
20
RISC-V Based Secure Processor Architecture for Return Address Protection
ISSN: 2380-6923Published: IEEE 04.01.2025Published in VLSI design (04.01.2025)“… Buffer over-flow (BFO) attacks, specifically on Stack, can alter the program execution flow and are extensively employed by attackers…”
Get full text
Conference Proceeding

