Výsledky vyhľadávania - stack buffer overflow attack
-
1
RS-Stack: Defense against Stack Buffer Overflow Attack with Random Shadow Stack
Vydavateľské údaje: IEEE 28.10.2022Vydané v 2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA) (28.10.2022)“…Shadow stack is a method to prevent stack buffer overflow attack. However, in the existing shadow stack solutions, it is often supposed that the shadow stack is safe, but the reality is not always the case…”
Získať plný text
Konferenčný príspevok.. -
2
Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE
ISSN: 2832-1324Vydavateľské údaje: IEEE 27.11.2023Vydané v International Symposium on Computing and Networking Workshops (Online) (27.11.2023)“… We also propose a method for preventing attacks that exploit stack buffer overflows in TA command calls…”
Získať plný text
Konferenčný príspevok.. -
3
Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core
Vydavateľské údaje: IEEE 11.03.2025Vydané v 2025 IEEE 26th Latin American Test Symposium (LATS) (11.03.2025)“…The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks…”
Získať plný text
Konferenčný príspevok.. -
4
HardStack: Prevent Stack Buffer Overflow Attack with LBR
Vydavateľské údaje: IEEE 01.12.2019Vydané v 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) (01.12.2019)“…Stack buffer overflow attack can temper with software control flow by continuously injecting data into stack and overwriting function return address…”
Získať plný text
Konferenčný príspevok.. -
5
Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks
ISSN: 0272-1732, 1937-4143Vydavateľské údaje: Los Alamitos IEEE 01.07.2006Vydané v IEEE MICRO (01.07.2006)“… A microarchitecture-based, software-transparent mechanism offers protection against stack-based buffer overflow attacks with moderate hardware cost and negligible performance…”
Získať plný text
Journal Article -
6
Nile: A Programmable Monitoring Coprocessor
ISSN: 1556-6056, 1556-6064Vydavateľské údaje: New York IEEE 01.01.2018Vydané v IEEE computer architecture letters (01.01.2018)“…Researchers widely employ hardware performance counters (HPCs) as well as debugging and profiling tools in processors for monitoring different events such as…”
Získať plný text
Journal Article -
7
Hardware-based stack buffer overflow attack detection on RISC-V architectures
ISSN: 2331-8422Vydavateľské údaje: Ithaca Cornell University Library, arXiv.org 12.06.2024Vydané v arXiv.org (12.06.2024)“…This work evaluates how well hardware-based approaches detect stack buffer overflow (SBO…”
Získať plný text
Paper -
8
ShadowStack: A new approach for secure program execution
ISSN: 0026-2714Vydavateľské údaje: 01.08.2015Vydané v Microelectronics and reliability (01.08.2015)Získať plný text
Journal Article -
9
An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks
Vydavateľské údaje: IEEE 01.12.2018Vydané v 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) (01.12.2018)“… With such overhead, the defender can use software-only approaches only to the debugging context. In this paper, we present a novel hardware approach to detect stack based buffer overflow attack during runtime…”
Získať plný text
Konferenčný príspevok.. -
10
Secure Patrol: Patrolling Against Buffer Overflow Exploits
ISSN: 1939-3555, 1939-3547Vydavateľské údaje: Philadelphia, PA Taylor & Francis 04.05.2014Vydané v Information security journal. (04.05.2014)“…Buffer overflow attacks are caused due to exploitation of stack or heap in computer memory…”
Získať plný text
Journal Article -
11
Massachusetts Inventor Develops Stack Buffer Overflow Attack Preventing Method
Vydavateľské údaje: Washington, D.C HT Digital Streams Limited 03.08.2006Vydané v US Fed News Service, Including US State News (03.08.2006)Získať plný text
Newsletter -
12
To Detect Stack Buffer Overflow with Polymorphic Canaries
ISSN: 2158-3927Vydavateľské údaje: IEEE 01.06.2018Vydané v Proceedings - International Conference on Dependable Systems and Networks (01.06.2018)“…Stack Smashing Protection (SSP) is a simple and highly efficient technique widely used in practice as the front line defense against stack buffer overflow attacks…”
Získať plný text
Konferenčný príspevok.. -
13
A Fine-Grained Control Flow Integrity Approach Against Runtime Memory Attacks for Embedded Systems
ISSN: 1063-8210, 1557-9999Vydavateľské údaje: New York IEEE 01.11.2016Vydané v IEEE transactions on very large scale integration (VLSI) systems (01.11.2016)“…Runtime attacks on memory, such as buffer overflow based stack smashing and code reuse attacks, are common in embedded systems…”
Získať plný text
Journal Article -
14
Guided Learning and Interactive Visualization for Teaching & Learning Stack Smashing Attacks & Defenses: Experiences and Evaluation
ISSN: 2377-634XVydavateľské údaje: IEEE 13.10.2024Vydané v Proceedings - Frontiers in Education Conference (13.10.2024)“… Widely ubiquitous buffer overflow vul-nerabilities and stack smashing attacks that exploit them are critical components in advanced software security curricula, since buffer overflows can arise due…”
Získať plný text
Konferenčný príspevok.. -
15
Preventing buffer overflow attacks using Binary of Split Stack (BoSS)
ISBN: 0549352244, 9780549352242Vydavateľské údaje: ProQuest Dissertations & Theses 01.01.2007“… Key idea in buffer overflow attack is to overrun any buffer stored on the local stack and overwrite the control flow information like return address of the current function…”
Získať plný text
Dissertation -
16
Variable Record Table: A Run-time Solution for Mitigating Buffer Overflow Attack
ISSN: 1558-3899Vydavateľské údaje: IEEE 01.08.2019Vydané v Conference proceedings : Midwest Symposium on Circuits and Systems (01.08.2019)“…We present a novel approach to mitigate buffer overflow attack using Variable Record Table (VRT…”
Získať plný text
Konferenčný príspevok.. -
17
Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems
ISSN: 1877-0509, 1877-0509Vydavateľské údaje: Elsevier B.V 2016Vydané v Procedia computer science (2016)“…We address the particular cyber attack technique known as stack buffer overflow in GNU/Linux operating systems, which are widely used in HPC environments…”
Získať plný text
Journal Article -
18
SSPFA: effective stack smashing protection for Android OS
ISSN: 1615-5262, 1615-5270Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2019Vydané v International journal of information security (01.08.2019)“…In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails…”
Získať plný text
Journal Article -
19
A New Class of Buffer Overflow Attacks
ISBN: 1612843840, 9781612843841ISSN: 1063-6927Vydavateľské údaje: IEEE 01.06.2011Vydané v 2011 31st International Conference on Distributed Computing Systems (01.06.2011)“… Such overflows can lead to stack as well as heap/data/bss overflows, which can be exploited by attackers in order to carry out the entire range of attacks associated with buffer overflow…”
Získať plný text
Konferenčný príspevok.. -
20
RISC-V Based Secure Processor Architecture for Return Address Protection
ISSN: 2380-6923Vydavateľské údaje: IEEE 04.01.2025Vydané v VLSI design (04.01.2025)“… Buffer over-flow (BFO) attacks, specifically on Stack, can alter the program execution flow and are extensively employed by attackers…”
Získať plný text
Konferenčný príspevok..

