Search Results - "Buffer overflow vulnerabilities"
-
1
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.11.2013Published in IEEE transactions on dependable and secure computing (01.11.2013)“… This paper presents SafeStack, a system that can automatically diagnose and patch stack-based buffer overflow vulnerabilities…”
Get full text
Journal Article -
2
Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2021Published in IEEE access (2021)“… Nevertheless, most buffer overflow vulnerabilities are not detectable by vulnerability detection tools and static analysis tools (SATs…”
Get full text
Journal Article -
3
Defending against Buffer-Overflow Vulnerabilities
ISSN: 0018-9162, 1558-0814Published: New York, NY IEEE 01.11.2011Published in Computer (Long Beach, Calif.) (01.11.2011)“…A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a…”
Get full text
Journal Article -
4
Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
ISSN: 1999-5903, 1999-5903Published: Basel MDPI AG 01.05.2023Published in Future internet (01.05.2023)“…Advanced Driver Assistance Systems (ADASs) are crucial components of intelligent vehicles, equipped with a vast code base. To enhance the security of ADASs, it…”
Get full text
Journal Article -
5
Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis
ISSN: 1751-8806, 1751-8814, 1751-8814Published: The Institution of Engineering and Technology 01.04.2016Published in IET software (01.04.2016)“…Buffer overflow (BOF) vulnerabilities when present in code can be exploited to violate security objectives such as availability, confidentiality and integrity…”
Get full text
Journal Article -
6
Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning
ISSN: 1024-123X, 1563-5147Published: Cairo, Egypt Hindawi Publishing Corporation 01.01.2017Published in Mathematical problems in engineering (01.01.2017)“…Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly…”
Get full text
Journal Article -
7
Buffer overflow vulnerabilities in CUDA: a preliminary analysis
ISSN: 2263-8733, 2263-8733Published: Paris Springer Paris 01.05.2016Published in Journal of computer virology and hacking techniques (01.05.2016)“…We present a preliminary study of buffer overflow vulnerabilities in CUDA software running on GPUs…”
Get full text
Journal Article -
8
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
ISSN: 2523-3246, 2523-3246Published: Singapore Springer Singapore 08.09.2020Published in Cybersecurity (Singapore) (08.09.2020)“…The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems. Automatically…”
Get full text
Journal Article -
9
Automated exploit generation for stack buffer overflow vulnerabilities
ISSN: 0361-7688, 1608-3261Published: Moscow Pleiades Publishing 01.11.2015Published in Programming and computer software (01.11.2015)“…An automated method for exploit generation is presented. This method allows one to construct exploits for stack buffer overflow vulnerabilities and to prioritize software bugs…”
Get full text
Journal Article -
10
Automated exploit generation method for stack buffer overflow vulnerabilities
ISSN: 2079-8156, 2220-6426Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018Published in Trudy Instituta sistemnogo programmirovaniâ (01.10.2018)“…In this paper automated method for exploit generation is presented. This method allows to construct exploits for stack buffer overflow vulnerabilities and also to prioritize software bugs…”
Get full text
Journal Article -
11
A combinatorial approach to detecting buffer overflow vulnerabilities
ISBN: 9781424492329, 1424492327ISSN: 1530-0889Published: IEEE 01.06.2011Published in 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN) (01.06.2011)“…Buffer overflow vulnerabilities are program defects that can cause a buffer to overflow at runtime…”
Get full text
Conference Proceeding -
12
Buffer Overflow Vulnerabilities and Prevention
ISSN: 2582-3930, 2582-3930Published: 26.06.2022Published in INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (26.06.2022)“… Buffer overflow vulnerabilities influence the zone of remote network penetration vulnerabilities, where an anonymous user tries to gain partial or complete control of the host…”
Get full text
Journal Article -
13
Automatic Exploit Generation for Buffer Overflow Vulnerabilities
Published: IEEE 01.07.2018Published in 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS C) (01.07.2018)“…Buffer overflow vulnerabilities are widely found in software. Finding these vulnerabilities and identifying whether these vulnerabilities can be exploit is very important…”
Get full text
Conference Proceeding -
14
BovInspector: Automatic inspection and repair of buffer overflow vulnerabilities
Published: ACM 25.08.2016Published in Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering (25.08.2016)“…Buffer overflow is one of the most common types of software vulnerabilities. Various static analysis and dynamic testing techniques have been proposed to detect buffer overflow vulnerabilities…”
Get full text
Conference Proceeding -
15
Locating Buffer Overflow Vulnerabilities Based on Sensitive Functions
ISSN: 2770-7695Published: IEEE 01.09.2022Published in International Conference on Computer Network, Electronic and Automation (Online) (01.09.2022)“…Buffer overflow vulnerability (BOV) is a kind of dangerous vulnerability among software vulnerabilities…”
Get full text
Conference Proceeding -
16
A comparative analysis of Buffer Overflow vulnerabilities in High-End IoT devices
Published: IEEE 26.01.2022Published in 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (26.01.2022)“…The increasing number of available interconnected Internet of Things (IoT) devices has exposed many security vulnerabilities. This paper presents an analysis…”
Get full text
Conference Proceeding -
17
CISA, FBI Warn of Buffer Overflow Vulnerabilities
Published: Madison Industrial Media 13.02.2025Published in Manufacturing.net (13.02.2025)Get full text
Trade Publication Article -
18
A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)
ISBN: 9780769522524, 0769522521ISSN: 1063-9527Published: IEEE 2004Published in 20th Annual Computer Security Applications Conference (2004)“…Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt other data structures…”
Get full text
Conference Proceeding -
19
Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
Published: IEEE 01.03.2019Published in 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) (01.03.2019)“… In this paper, we propose a novel approach that detects existing buffer-overflow vulnerabilities of terminal devices via automatic static analysis (ASA…”
Get full text
Conference Proceeding -
20
Research on Dynamic Detection Method of Buffer Overflow Vulnerabilities Based on Complete Boundary Test
Published: IEEE 11.12.2020Published in 2020 IEEE 6th International Conference on Computer and Communications (ICCC) (11.12.2020)“… For this kind of software and its running environment, it is difficult to reduce the false positive rate and false negative rate with traditional static detection method for buffer overflow…”
Get full text
Conference Proceeding

