Výsledky vyhľadávania - buffer-overflow vulnerability detection
-
1
BovdGFE: buffer overflow vulnerability detection based on graph feature extraction
ISSN: 0924-669X, 1573-7497Vydavateľské údaje: New York Springer US 01.06.2023Vydané v Applied intelligence (Dordrecht, Netherlands) (01.06.2023)“…Automatically detecting buffer overflow vulnerabilities is an important research topic in software security…”
Získať plný text
Journal Article -
2
Buffer Overflow Vulnerability Detection Based on Unsafe Function Invocation
ISSN: 1742-6588, 1742-6596Vydavateľské údaje: Bristol IOP Publishing 01.06.2020Vydané v Journal of physics. Conference series (01.06.2020)“… In order to effectively mitigate buffer vulnerabilities, we proposed a buffer overflow vulnerability detection technique based on unsafe function invocation…”
Získať plný text
Journal Article -
3
BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis
ISSN: 1939-0114, 1939-0122Vydavateľské údaje: London Hindawi 22.06.2022Vydané v Security and communication networks (22.06.2022)“…Stack buffer overflow vulnerability is a common software vulnerability that can overwrite function return addresses and hijack program control flow, causing serious system problems…”
Získať plný text
Journal Article -
4
Smart fuzzing method for detecting stack-based buffer overflow in binary codes
ISSN: 1751-8806, 1751-8814, 1751-8814Vydavateľské údaje: The Institution of Engineering and Technology 01.08.2016Vydané v IET software (01.08.2016)“…During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the computer systems…”
Získať plný text
Journal Article -
5
Binary Static Analysis-based Buffer Overflow Vulnerability Detection Technique using Function Prologue and Epilogue
ISSN: 2383-6318, 2383-6326Vydavateľské údaje: 31.10.2024Vydané v KIISE Transactions on Computing Practices (31.10.2024)Získať plný text
Journal Article -
6
Buffer Overflow Vulnerability Detection Based on Static Analysis-assisted Symbolic Execution
Vydavateľské údaje: IEEE 18.08.2023Vydané v 2023 4th International Symposium on Computer Engineering and Intelligent Communications (ISCEIC) (18.08.2023)“…Buffer overflow is a common exploitable high-risk vulnerability that can lead to arbitrary code execution, thus effective detection of buffer overflow vulnerability is of utmost importance…”
Získať plný text
Konferenčný príspevok.. -
7
A combinatorial approach to detecting buffer overflow vulnerabilities
ISBN: 9781424492329, 1424492327ISSN: 1530-0889Vydavateľské údaje: IEEE 01.06.2011Vydané v 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN) (01.06.2011)“… In this paper, we present a black-box testing approach to detecting buffer overflow vulnerabilities…”
Získať plný text
Konferenčný príspevok.. -
8
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
Vydavateľské údaje: IEEE 01.06.2023Vydané v 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC) (01.06.2023)“… open-source code containing millions of functions with potential buffer overflow exploits…”
Získať plný text
Konferenčný príspevok.. -
9
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
ISSN: 2523-3246, 2523-3246Vydavateľské údaje: Singapore Springer Singapore 08.09.2020Vydané v Cybersecurity (Singapore) (08.09.2020)“…The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems…”
Získať plný text
Journal Article -
10
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities
ISBN: 0780382307, 9780780382305ISSN: 1542-1201“… In this paper, we propose a simple solution called "Buttercup" to counter against attacks based on buffer-overflow exploits…”Vydavateľské údaje: Piscataway NJ IEEE 2004
Získať plný text
Konferenčný príspevok.. -
11
PwnMaster: Automatic Buffer Overflow and Format String Vulnerability Detection and Exploitation
ISBN: 9798350361919ISSN: 1844-7872Vydavateľské údaje: IEEE 16.05.2024Vydané v 2024 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR) (16.05.2024)“…Automated detection tools play a crucial role in assisting researchers to identify and rectify existing software flaws…”
Získať plný text
Konferenčný príspevok.. -
12
Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
Vydavateľské údaje: IEEE 01.03.2019Vydané v 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) (01.03.2019)“… In this paper, we propose a novel approach that detects existing buffer-overflow vulnerabilities of terminal devices via automatic static analysis (ASA…”
Získať plný text
Konferenčný príspevok.. -
13
Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects
ISSN: 2169-3536, 2169-3536Vydavateľské údaje: Piscataway IEEE 2021Vydané v IEEE access (2021)“… Nevertheless, most buffer overflow vulnerabilities are not detectable by vulnerability detection tools and static analysis tools (SATs…”
Získať plný text
Journal Article -
14
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks
ISSN: 2331-8422Vydavateľské údaje: Ithaca Cornell University Library, arXiv.org 01.06.2023Vydané v arXiv.org (01.06.2023)“… open-source code containing millions of functions with potential buffer overflow exploits…”
Získať plný text
Paper -
15
What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability
ISSN: 2640-4265, 2640-4273Vydavateľské údaje: Hershey IGI Global 01.07.2018Vydané v International journal of systems and software security and protection (01.07.2018)“…Buffer overflow (BO) is a well-known and widely exploited security vulnerability…”
Získať plný text
Journal Article -
16
Static Analysis Method for Detecting Buffer Overflow Vulnerabilities
ISSN: 0361-7688, 1608-3261Vydavateľské údaje: New York Springer Nature B.V 01.07.2005Vydané v Programming and computer software (01.07.2005)“…In this paper, a new static method for automated detection of vulnerabilities that could result in buffer overflows in programs is suggested…”
Získať plný text
Journal Article -
17
Research on Dynamic Detection Method of Buffer Overflow Vulnerabilities Based on Complete Boundary Test
Vydavateľské údaje: IEEE 11.12.2020Vydané v 2020 IEEE 6th International Conference on Computer and Communications (ICCC) (11.12.2020)“… For this kind of software and its running environment, it is difficult to reduce the false positive rate and false negative rate with traditional static detection method for buffer overflow…”
Získať plný text
Konferenčný príspevok.. -
18
Poster: Analytical Study on Large Language Models' Detection Capability for Buffer Overflow and Integer Overflow Vulnerabilities
ISSN: 2158-9208Vydavateľské údaje: IEEE 10.10.2025Vydané v Proceedings of the ... International Symposium on Parallel and Distributed Processing with Applications (Print) (10.10.2025)“… However, systematic investigation of LLMs for buffer and integer overflows vulnerabilityies detection remains notably lacking…”
Získať plný text
Konferenčný príspevok.. -
19
A method for detecting buffer overflow vulnerabilities
ISBN: 9781612844855, 1612844855Vydavateľské údaje: IEEE 01.05.2011Vydané v 2011 IEEE 3rd International Conference on Communication Software and Networks (01.05.2011)“… The paper presents a method that combines static analysis with dynamic test to deal with the problem on buffer overflow vulnerabilities detecting…”
Získať plný text
Konferenčný príspevok.. -
20
Light-Weight Rule-Based Test Case Generation for Detecting Buffer Overflow Vulnerabilities
Vydavateľské údaje: IEEE 01.05.2015Vydané v 2015 IEEE/ACM 10th International Workshop on Automation of Software Test (01.05.2015)“… Despite existence of many detection solutions, buffer overflow bugs are widely being reported in multitude of applications suggesting either inherent limitations in current solutions or problems…”
Získať plný text
Konferenčný príspevok..

