Výsledky vyhľadávania - (( exploiting buffer overflow ) OR ( exploring buffer overflow ))
-
1
Exploiting stack-based buffer overflow using modern day techniques
ISSN: 1877-0509, 1877-0509Vydavateľské údaje: Elsevier B.V 2019Vydané v Procedia computer science (2019)“…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow…”
Získať plný text
Journal Article -
2
Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios
“…As wireless systems are becoming more complex, there is a shift towards implementing these systems completely in software and firmware rather than hardware…”Vydavateľské údaje: IEEE 01.07.2018
Získať plný text
Konferenčný príspevok.. -
3
Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core
Vydavateľské údaje: IEEE 11.03.2025Vydané v 2025 IEEE 26th Latin American Test Symposium (LATS) (11.03.2025)“…The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks…”
Získať plný text
Konferenčný príspevok.. -
4
Buffer overflow attacks : detect, exploit, prevent
ISBN: 9781932266672, 1932266674Vydavateľské údaje: Rockland, Mass Syngress 2005“…The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer…”
Získať plný text
E-kniha Kniha -
5
Exploiting buffer overflows over Bluetooth: the BluePass tool
ISBN: 0780390199, 9780780390195ISSN: 1811-3923Vydavateľské údaje: IEEE 2005Vydané v Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005 (2005)“… For this reason is not acceptable any kind of unexpected or unsafe failure. Since many embedded systems don't include a security framework and are vulnerable to buffer…”
Získať plný text
Konferenčný príspevok.. -
6
SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks
ISBN: 9780769526775, 0769526772ISSN: 1060-9857Vydavateľské údaje: IEEE 01.10.2006Vydané v 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06) (01.10.2006)“…This paper presents a strong and efficient scheme for protecting against buffer overflow attacks…”
Získať plný text
Konferenčný príspevok.. -
7
SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks
ISSN: 1060-9857Vydavateľské údaje: IEEE 01.10.2006Vydané v 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06) (01.10.2006)Získať plný text
Journal Article -
8
Buffer overflow and format string overflow vulnerabilities
ISSN: 0038-0644, 1097-024XVydavateľské údaje: Chichester, UK John Wiley & Sons, Ltd 25.04.2003Vydané v Software, practice & experience (25.04.2003)“… This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures…”
Získať plný text
Journal Article -
9
Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation
ISSN: 1063-6692, 1558-2566Vydavateľské údaje: New York IEEE 01.02.2010Vydané v IEEE/ACM transactions on networking (01.02.2010)“… As the first step, we design a network-based length-based signature generator (LESG) for the worms exploiting buffer overflow vulnerabilities…”
Získať plný text
Journal Article -
10
ROPocop — Dynamic mitigation of code-reuse attacks
ISSN: 2214-2126Vydavateľské údaje: Elsevier Ltd 01.08.2016Vydané v Journal of information security and applications (01.08.2016)“…Control-flow attacks, usually achieved by exploiting a buffer-overflow vulnerability, have been a serious threat to system security for over fifteen years…”
Získať plný text
Journal Article -
11
Secure Patrol: Patrolling Against Buffer Overflow Exploits
ISSN: 1939-3555, 1939-3547Vydavateľské údaje: Philadelphia, PA Taylor & Francis 04.05.2014Vydané v Information security journal. (04.05.2014)“… Another potential actor in buffer overflow attacks is Global Offset Table (GOT); exploiting it can also lead to disastrous results, such as a call to printf…”
Získať plný text
Journal Article -
12
Exploitation Analysis of Buffer Overflow in SL-Mail Server
ISSN: 2768-0673Vydavateľské údaje: IEEE 11.11.2021Vydané v International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (Online) (11.11.2021)“…Buffer overflows are known as the most widely used and the oldest forms of attacks used by attackers to gain access for remote code execution and similar attacks…”
Získať plný text
Konferenčný príspevok.. -
13
Enhancing security using legality assertions
ISBN: 0769524745, 9780769524740ISSN: 1095-1350Vydavateľské údaje: IEEE 2005Vydané v 12th Working Conference on Reverse Engineering (WCRE'05) (2005)“…Buffer overflows have been the most common form of security vulnerability in the past decade…”
Získať plný text
Konferenčný príspevok.. -
14
Integrating Cyber-Attack Defense Techniques into Real-Time Cyber-Physical Systems
ISSN: 2576-6996Vydavateľské údaje: IEEE 01.11.2019Vydané v Proceedings - IEEE International Conference on Computer Design (01.11.2019)“… A well-known attack is ReturnOriented Programming (ROP) which can diverge the control flow of a program by exploiting the buffer overflow vulnerability…”
Získať plný text
Konferenčný príspevok.. -
15
StackOFFence: a technique for defending against buffer overflow attacks
ISBN: 0769523153, 9780769523156Vydavateľské údaje: IEEE 2005Vydané v ITCC 2005 : International Conference on Information Technology: Coding and Computing : proceedings : 4-6 April, 2005, Las Vegas, Nevada (2005)“… This results in software code that is more vulnerable to security intrusions exploiting buffer overflow vulnerabilities…”
Získať plný text
Konferenčný príspevok.. -
16
Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code
ISSN: 2768-1831Vydavateľské údaje: IEEE 24.04.2025Vydané v Proceedings (International Symposium on Digital Forensic and Security. Online) (24.04.2025)“… To detect vulnerabilities such as buffer overflows in compiled code, this research investigates the application of unidirectional transformer-based embeddings, specifically G PT-2…”
Získať plný text
Konferenčný príspevok.. -
17
On Detecting Code Reuse Attacks
ISSN: 0146-4116, 1558-108XVydavateľské údaje: Moscow Pleiades Publishing 01.12.2020Vydané v Automatic control and computer sciences (01.12.2020)“…— Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow…”
Získať plný text
Journal Article -
18
Removing architectural bottlenecks to the scalability of speculative parallelization
ISBN: 0769511627, 9780769511627ISSN: 1063-6897“… The solutions that we propose are: low-complexity commit in constant time to eliminate the task commit bottleneck, a memory-based overflow area to eliminate stall due to speculative buffer overflow, and exploiting high-level access…”Vydavateľské údaje: IEEE 2001
Získať plný text
Konferenčný príspevok.. -
19
Automatic Exploit Generation for Buffer Overflow Vulnerabilities
Vydavateľské údaje: IEEE 01.07.2018Vydané v 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS C) (01.07.2018)“…Buffer overflow vulnerabilities are widely found in software. Finding these vulnerabilities and identifying whether these vulnerabilities can be exploit is very important…”
Získať plný text
Konferenčný príspevok.. -
20
Cross-layer adaptive transmission with incomplete system state information
ISSN: 0090-6778, 1558-0857Vydavateľské údaje: New York, NY IEEE 01.11.2008Vydané v IEEE transactions on communications (01.11.2008)“… Data packets are subject to loss due to buffer overflow and transmission errors. We study the problem of adapting the transmit power and rate based on the buffer…”
Získať plný text
Journal Article

