Výsledky vyhľadávania - Buffer overflow exploit
-
1
Secure Patrol: Patrolling Against Buffer Overflow Exploits
ISSN: 1939-3555, 1939-3547Vydavateľské údaje: Philadelphia, PA Taylor & Francis 04.05.2014Vydané v Information security journal. (04.05.2014)“…Buffer overflow attacks are caused due to exploitation of stack or heap in computer memory…”
Získať plný text
Journal Article -
2
Buffer overflow attacks : detect, exploit, prevent
ISBN: 9781932266672, 1932266674Vydavateľské údaje: Rockland, Mass Syngress 2005“…; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love…”
Získať plný text
E-kniha Kniha -
3
Analysis of Buffer Overflow Exploits and Prevention Strategies
ISBN: 9783038350125, 3038350125ISSN: 1660-9336, 1662-7482, 1662-7482Vydavateľské údaje: Zurich Trans Tech Publications Ltd 06.02.2014Vydané v Applied Mechanics and Materials (06.02.2014)“… This article first explains the concept of buffer overflow,and then from the programming language itself flawed,not robust perspective on the emergence,to the emergence of buffer overflow attacks…”
Získať plný text
Journal Article -
4
Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits
ISSN: 2032-9393, 2032-9393Vydavateľské údaje: Ghent European Alliance for Innovation (EAI) 05.10.2015Vydané v EAI endorsed transactions on security and safety (05.10.2015)“…Despite the fact that protection mechanisms like StackGuard, ASLR and NX are widespread, the development on new defense strategies against stack-based buffer overflows has not yet come to an end…”
Získať plný text
Journal Article -
5
Techniques for Defending from Buffer Overflow Vulnerability Security Exploits
ISSN: 1089-7801, 1941-0131Vydavateľské údaje: IEEE 2019Vydané v IEEE internet computing (2019)“… or have limitations preventing their use and adoption. In this article, we discuss well-known buffer overflow vulnerability exploit mechanisms followed by comprehensive study of proposals for defending from such exploits along with review of tools used…”
Získať plný text
Journal Article -
6
BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis
ISSN: 1939-0114, 1939-0122Vydavateľské údaje: London Hindawi 22.06.2022Vydané v Security and communication networks (22.06.2022)“… In this paper, we propose a solution to alleviate the above difficulties: BofAEG, which is based on symbolic execution and dynamic analysis to automatically detect stack buffer overflow vulnerability and generate exploit…”
Získať plný text
Journal Article -
7
Automated exploit generation for stack buffer overflow vulnerabilities
ISSN: 0361-7688, 1608-3261Vydavateľské údaje: Moscow Pleiades Publishing 01.11.2015Vydané v Programming and computer software (01.11.2015)“…An automated method for exploit generation is presented. This method allows one to construct exploits for stack buffer overflow vulnerabilities and to prioritize software bugs…”
Získať plný text
Journal Article -
8
Buffer Overflow Exploits
ISSN: 2616-7476, 1998-4162Vydavateľské údaje: Shaheed Zulfikar Ali Bhutto Institute of Science and Technology 31.12.2003Vydané v JISR Management and Social Sciences & Economics (31.12.2003)“…The focus of this Study is on providing an understanding of buffer overflows, the ways they are exploited, and ways to prevent attackers from abusing…”
Získať plný text
Journal Article -
9
Buffer Overflow Exploit and Defensive Techniques
ISBN: 9781467330930, 1467330930ISSN: 2162-8998Vydavateľské údaje: IEEE 01.11.2012Vydané v 2012 Fourth International Conference on Multimedia Information Networking and Security (01.11.2012)“…Buffer overflow attack is most common and dangerous attack method at present. So the analysis is useful in studying the principle of buffer overflow and buffer overflow exploits…”
Získať plný text
Konferenčný príspevok.. -
10
Automated exploit generation method for stack buffer overflow vulnerabilities
ISSN: 2079-8156, 2220-6426Vydavateľské údaje: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018Vydané v Trudy Instituta sistemnogo programmirovaniâ (01.10.2018)“…In this paper automated method for exploit generation is presented. This method allows to construct exploits for stack buffer overflow vulnerabilities and also to prioritize software bugs…”
Získať plný text
Journal Article -
11
Architectural Support For Stack Buffer Overflow Exploit Prevention
ISBN: 1267658754, 9781267658753Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2012“… Under the new design paradigm, two proof-of-concept features are presented. A low overhead and yet effective micro-architectural checking mechanism to reduce the risk from stack overflow exploits…”
Získať plný text
Dissertation -
12
Automatic Exploit Generation for Buffer Overflow Vulnerabilities
Vydavateľské údaje: IEEE 01.07.2018Vydané v 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS C) (01.07.2018)“…Buffer overflow vulnerabilities are widely found in software. Finding these vulnerabilities and identifying whether these vulnerabilities can be exploit is very important…”
Získať plný text
Konferenčný príspevok.. -
13
Amazon.com (AMZN) issued patent titled "Buffer overflow exploit detection"
Vydavateľské údaje: Melbourne News Bites Pty Ltd 18.10.2019Vydané v News Bites - Computing & Information (18.10.2019)Získať plný text
Newsletter -
14
Amazon Technologies Assigned Patent for Buffer Overflow Exploit Detection
Vydavateľské údaje: Washington, D.C Targeted News Service 17.02.2018Vydané v Targeted News Service (17.02.2018)Získať plný text
Newsletter -
15
US Patent Issued to AMAZON TECHNOLOGIES on Oct. 15 for "Buffer overflow exploit detection" (Canadian Inventor)
Vydavateľské údaje: Washington, D.C HT Digital Streams Limited 16.10.2019Vydané v US Fed News Service, Including US State News (16.10.2019)Získať plný text
Newsletter -
16
US Patent Issued to AMAZON TECHNOLOGIES on Feb. 13 for "Buffer overflow exploit detection" (Nevada Inventor)
Vydavateľské údaje: Washington, D.C HT Digital Streams Limited 13.02.2018Vydané v US Fed News Service, Including US State News (13.02.2018)Získať plný text
Newsletter -
17
Exploiting stack-based buffer overflow using modern day techniques
ISSN: 1877-0509, 1877-0509Vydavateľské údaje: Elsevier B.V 2019Vydané v Procedia computer science (2019)“… Nowadays, due to multiple protection mechanisms enforced by the operating system and on the executable level, the buffer overflow has become harder to exploit…”
Získať plný text
Journal Article -
18
A metric for identifying system exploitation developed through a study in buffer overflow exploits
ISBN: 0542054760, 9780542054761Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2004“…Buffer overflow exploits are the most utilized method for gaining unauthorized control over a system…”
Získať plný text
Dissertation -
19
What is a buffer overflow? And how hackers exploit these vulnerabilities
Vydavateľské údaje: Framingham Foundry 22.01.2020Vydané v CSO (Online) (22.01.2020)“…Another reason why buffer overflows are back in the spotlight might be the rise of internet-of-things (IoT…”
Získať plný text
Trade Publication Article -
20
A chit-chat between Llama 2 and ChatGPT for the automated creation of exploits
ISSN: 1389-1286Vydavateľské údaje: Elsevier B.V 01.10.2025Vydané v Computer networks (Amsterdam, Netherlands : 1999) (01.10.2025)“… However, creating a software exploit is typically a time-consuming and manual task that demands a deep understanding of programming, network protocols, operating system internals, and computer architectures…”
Získať plný text
Journal Article

