Výsledky vyhľadávania - (( exploiting buffer overflow ) OR ( exploring buffer overflow ))

  1. 1

    Exploiting stack-based buffer overflow using modern day techniques Autor Nicula, Ștefan, Zota, Răzvan Daniel

    ISSN: 1877-0509, 1877-0509
    Vydavateľské údaje: Elsevier B.V 2019
    Vydané v Procedia computer science (2019)
    “…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow…”
    Získať plný text
    Journal Article
  2. 2

    Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios Autor Hitefield, S. D., Fowler, M., Clancy, T. Charles

    Vydavateľské údaje: IEEE 01.07.2018
    “…As wireless systems are becoming more complex, there is a shift towards implementing these systems completely in software and firmware rather than hardware…”
    Získať plný text
    Konferenčný príspevok..
  3. 3

    Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core Autor Chenet, Cristiano Pegoraro, Savino, Alessandro, Di Carlo, Stefano

    Vydavateľské údaje: IEEE 11.03.2025
    “…The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks…”
    Získať plný text
    Konferenčný príspevok..
  4. 4

    Buffer overflow attacks : detect, exploit, prevent Autor Foster, James C.

    ISBN: 9781932266672, 1932266674
    Vydavateľské údaje: Rockland, Mass Syngress 2005
    “…The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer…”
    Získať plný text
    E-kniha Kniha
  5. 5

    Exploiting buffer overflows over Bluetooth: the BluePass tool Autor Gianluigi Me

    ISBN: 0780390199, 9780780390195
    ISSN: 1811-3923
    Vydavateľské údaje: IEEE 2005
    “… For this reason is not acceptable any kind of unexpected or unsafe failure. Since many embedded systems don't include a security framework and are vulnerable to buffer…”
    Získať plný text
    Konferenčný príspevok..
  6. 6

    SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks Autor Shinagawa, T.

    ISBN: 9780769526775, 0769526772
    ISSN: 1060-9857
    Vydavateľské údaje: IEEE 01.10.2006
    “…This paper presents a strong and efficient scheme for protecting against buffer overflow attacks…”
    Získať plný text
    Konferenčný príspevok..
  7. 7
  8. 8

    Buffer overflow and format string overflow vulnerabilities Autor Lhee, Kyung-Suk, Chapin, Steve J.

    ISSN: 0038-0644, 1097-024X
    Vydavateľské údaje: Chichester, UK John Wiley & Sons, Ltd 25.04.2003
    Vydané v Software, practice & experience (25.04.2003)
    “… This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures…”
    Získať plný text
    Journal Article
  9. 9

    Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation Autor Wang, Lanjia, Li, Zhichun, Chen, Yan, Fu, Zhi (Judy), Li, Xing

    ISSN: 1063-6692, 1558-2566
    Vydavateľské údaje: New York IEEE 01.02.2010
    Vydané v IEEE/ACM transactions on networking (01.02.2010)
    “… As the first step, we design a network-based length-based signature generator (LESG) for the worms exploiting buffer overflow vulnerabilities…”
    Získať plný text
    Journal Article
  10. 10

    ROPocop — Dynamic mitigation of code-reuse attacks Autor Follner, Andreas, Bodden, Eric

    ISSN: 2214-2126
    Vydavateľské údaje: Elsevier Ltd 01.08.2016
    “…Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years…”
    Získať plný text
    Journal Article
  11. 11

    Secure Patrol: Patrolling Against Buffer Overflow Exploits Autor Solanki, Jaydeep, Shah, Aenik, Das, Manik Lal

    ISSN: 1939-3555, 1939-3547
    Vydavateľské údaje: Philadelphia, PA Taylor & Francis 04.05.2014
    Vydané v Information security journal. (04.05.2014)
    “… Another potential actor in buffer overflow attacks is Global Offset Table (GOT); exploiting it can also lead to disastrous results, such as a call to printf…”
    Získať plný text
    Journal Article
  12. 12

    Exploitation Analysis of Buffer Overflow in SL-Mail Server Autor Shafana, N. Jeenath, Pawar, Kshitij

    ISSN: 2768-0673
    Vydavateľské údaje: IEEE 11.11.2021
    “…Buffer overflows are known as the most widely used and the oldest forms of attacks used by attackers to gain access for remote code execution and similar attacks…”
    Získať plný text
    Konferenčný príspevok..
  13. 13

    Enhancing security using legality assertions Autor Lei Wang, Cordy, J.R., Dean, T.R.

    ISBN: 0769524745, 9780769524740
    ISSN: 1095-1350
    Vydavateľské údaje: IEEE 2005
    “…Buffer overflows have been the most common form of security vulnerability in the past decade…”
    Získať plný text
    Konferenčný príspevok..
  14. 14

    Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems Autor Hao, Xiaochen, Lv, Mingsong, Zheng, Jiesheng, Zhang, Zhengkui, Yi, Wang

    ISSN: 2576-6996
    Vydavateľské údaje: IEEE 01.11.2019
    “… A well-known attack is ReturnOriented Programming (ROP) which can diverge the control flow of a program by exploiting the buffer overflow vulnerability…”
    Získať plný text
    Konferenčný príspevok..
  15. 15

    StackOFFence: a technique for defending against buffer overflow attacks Autor Madan, B.B., Phoha, S., Trivedi, K.S.

    ISBN: 0769523153, 9780769523156
    Vydavateľské údaje: IEEE 2005
    “… This results in software code that is more vulnerable to security intrusions exploiting buffer overflow vulnerabilities…”
    Získať plný text
    Konferenčný príspevok..
  16. 16

    Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code Autor McCully, Gary A., Hastings, John D., Xu, Shengjie, Fortier, Adam

    ISSN: 2768-1831
    Vydavateľské údaje: IEEE 24.04.2025
    “… To detect vulnerabilities such as buffer overflows in compiled code, this research investigates the application of unidirectional transformer-based embeddings, specifically G PT-2…”
    Získať plný text
    Konferenčný príspevok..
  17. 17

    On Detecting Code Reuse Attacks Autor Kosolapov, Y. V.

    ISSN: 0146-4116, 1558-108X
    Vydavateľské údaje: Moscow Pleiades Publishing 01.12.2020
    “…— Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow…”
    Získať plný text
    Journal Article
  18. 18

    Removing architectural bottlenecks to the scalability of speculative parallelization Autor Prvulovic, M., Garzaran, M.J., Rauchwerger, L., Torrellas, J.

    ISBN: 0769511627, 9780769511627
    ISSN: 1063-6897
    Vydavateľské údaje: IEEE 2001
    “… The solutions that we propose are: low-complexity commit in constant time to eliminate the task commit bottleneck, a memory-based overflow area to eliminate stall due to speculative buffer overflow, and exploiting high-level access…”
    Získať plný text
    Konferenčný príspevok..
  19. 19

    Automatic Exploit Generation for Buffer Overflow Vulnerabilities Autor Xu, Luhang, Jia, Weixi, Dong, Wei, Li, Yongjun

    Vydavateľské údaje: IEEE 01.07.2018
    “…Buffer overflow vulnerabilities are widely found in software. Finding these vulnerabilities and identifying whether these vulnerabilities can be exploit is very important…”
    Získať plný text
    Konferenčný príspevok..
  20. 20

    Cross-layer adaptive transmission with incomplete system state information Autor Anh Tuan Hoang, Motani, M.

    ISSN: 0090-6778, 1558-0857
    Vydavateľské údaje: New York, NY IEEE 01.11.2008
    Vydané v IEEE transactions on communications (01.11.2008)
    “… Data packets are subject to loss due to buffer overflow and transmission errors. We study the problem of adapting the transmit power and rate based on the buffer…”
    Získať plný text
    Journal Article