Search Results - "Buffer overflow vulnerabilities"

Refine Results
  1. 1

    SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities by Chen, Gang, Jin, Hai, Zou, Deqing, Zhou, Bing Bing, Liang, Zhenkai, Zheng, Weide, Shi, Xuanhua

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.11.2013
    “… This paper presents SafeStack, a system that can automatically diagnose and patch stack-based buffer overflow vulnerabilities…”
    Get full text
    Journal Article
  2. 2

    Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects by Pereira, Jose D'Abruzzo, Ivaki, Naghmeh, Vieira, Marco

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2021
    Published in IEEE access (2021)
    “… Nevertheless, most buffer overflow vulnerabilities are not detectable by vulnerability detection tools and static analysis tools (SATs…”
    Get full text
    Journal Article
  3. 3

    Defending against Buffer-Overflow Vulnerabilities by Padmanabhuni, B., Hee Beng Kuan Tan

    ISSN: 0018-9162, 1558-0814
    Published: New York, NY IEEE 01.11.2011
    Published in Computer (Long Beach, Calif.) (01.11.2011)
    “…A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a…”
    Get full text
    Journal Article
  4. 4

    Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs by Li, Yufeng, Liu, Mengxiao, Cao, Chenhong, Li, Jiangtao

    ISSN: 1999-5903, 1999-5903
    Published: Basel MDPI AG 01.05.2023
    Published in Future internet (01.05.2023)
    “…Advanced Driver Assistance Systems (ADASs) are crucial components of intelligent vehicles, equipped with a vast code base. To enhance the security of ADASs, it…”
    Get full text
    Journal Article
  5. 5

    Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis by Padmanabhuni, Bindu Madhavi, Tan, Hee Beng Kuan

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Published: The Institution of Engineering and Technology 01.04.2016
    Published in IET software (01.04.2016)
    “…Buffer overflow (BOF) vulnerabilities when present in code can be exploited to violate security objectives such as availability, confidentiality and integrity…”
    Get full text
    Journal Article
  6. 6

    Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning by Tang, Chaojing, Zhang, Bin, Feng, Chao, Meng, Qingkun

    ISSN: 1024-123X, 1563-5147
    Published: Cairo, Egypt Hindawi Publishing Corporation 01.01.2017
    Published in Mathematical problems in engineering (01.01.2017)
    “…Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly…”
    Get full text
    Journal Article
  7. 7

    Buffer overflow vulnerabilities in CUDA: a preliminary analysis by Miele, Andrea

    ISSN: 2263-8733, 2263-8733
    Published: Paris Springer Paris 01.05.2016
    “…We present a preliminary study of buffer overflow vulnerabilities in CUDA software running on GPUs…”
    Get full text
    Journal Article
  8. 8

    ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis by Xu, Lili, Xu, Mingjie, Li, Feng, Huo, Wei

    ISSN: 2523-3246, 2523-3246
    Published: Singapore Springer Singapore 08.09.2020
    Published in Cybersecurity (Singapore) (08.09.2020)
    “…The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems. Automatically…”
    Get full text
    Journal Article
  9. 9

    Automated exploit generation for stack buffer overflow vulnerabilities by Padaryan, V. A., Kaushan, V. V., Fedotov, A. N.

    ISSN: 0361-7688, 1608-3261
    Published: Moscow Pleiades Publishing 01.11.2015
    Published in Programming and computer software (01.11.2015)
    “…An automated method for exploit generation is presented. This method allows one to construct exploits for stack buffer overflow vulnerabilities and to prioritize software bugs…”
    Get full text
    Journal Article
  10. 10

    Automated exploit generation method for stack buffer overflow vulnerabilities by Padaryan, V.A., Kaushan, V.V., Fedotov, A.N.

    ISSN: 2079-8156, 2220-6426
    Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018
    “…In this paper automated method for exploit generation is presented. This method allows to construct exploits for stack buffer overflow vulnerabilities and also to prioritize software bugs…”
    Get full text
    Journal Article
  11. 11

    A combinatorial approach to detecting buffer overflow vulnerabilities by Wenhua Wang, Yu Lei, Donggang Liu, Kung, D., Csallner, C., Dazhi Zhang, Kacker, R., Kuhn, R.

    ISBN: 9781424492329, 1424492327
    ISSN: 1530-0889
    Published: IEEE 01.06.2011
    “…Buffer overflow vulnerabilities are program defects that can cause a buffer to overflow at runtime…”
    Get full text
    Conference Proceeding
  12. 12

    Buffer Overflow Vulnerabilities and Prevention

    ISSN: 2582-3930, 2582-3930
    Published: 26.06.2022
    “… Buffer overflow vulnerabilities influence the zone of remote network penetration vulnerabilities, where an anonymous user tries to gain partial or complete control of the host…”
    Get full text
    Journal Article
  13. 13

    Automatic Exploit Generation for Buffer Overflow Vulnerabilities by Xu, Luhang, Jia, Weixi, Dong, Wei, Li, Yongjun

    Published: IEEE 01.07.2018
    “…Buffer overflow vulnerabilities are widely found in software. Finding these vulnerabilities and identifying whether these vulnerabilities can be exploit is very important…”
    Get full text
    Conference Proceeding
  14. 14

    BovInspector: Automatic inspection and repair of buffer overflow vulnerabilities by Fengjuan Gao, Linzhang Wang, Xuandong Li

    Published: ACM 25.08.2016
    “…Buffer overflow is one of the most common types of software vulnerabilities. Various static analysis and dynamic testing techniques have been proposed to detect buffer overflow vulnerabilities…”
    Get full text
    Conference Proceeding
  15. 15

    Locating Buffer Overflow Vulnerabilities Based on Sensitive Functions by Zhang, Li, Guo, Junjun, Xue, Yang, Deng, Yufeng

    ISSN: 2770-7695
    Published: IEEE 01.09.2022
    “…Buffer overflow vulnerability (BOV) is a kind of dangerous vulnerability among software vulnerabilities…”
    Get full text
    Conference Proceeding
  16. 16

    A comparative analysis of Buffer Overflow vulnerabilities in High-End IoT devices by Calatayud, Blas Molina, Meany, Liam

    Published: IEEE 26.01.2022
    “…The increasing number of available interconnected Internet of Things (IoT) devices has exposed many security vulnerabilities. This paper presents an analysis…”
    Get full text
    Conference Proceeding
  17. 17

    CISA, FBI Warn of Buffer Overflow Vulnerabilities

    Published: Madison Industrial Media 13.02.2025
    Published in Manufacturing.net (13.02.2025)
    Get full text
    Trade Publication Article
  18. 18

    A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors) by Rinard, M., Cadar, C., Dumitran, D., Roy, D.M., Leu, T.

    ISBN: 9780769522524, 0769522521
    ISSN: 1063-9527
    Published: IEEE 2004
    “…Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt other data structures…”
    Get full text
    Conference Proceeding
  19. 19

    Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis by Ying, Huan, Zhang, Yanmiao, Han, Lifang, Cheng, Yushi, Li, Jiyuan, Ji, Xiaoyu, Xu, Wenyuan

    Published: IEEE 01.03.2019
    “… In this paper, we propose a novel approach that detects existing buffer-overflow vulnerabilities of terminal devices via automatic static analysis (ASA…”
    Get full text
    Conference Proceeding
  20. 20

    Research on Dynamic Detection Method of Buffer Overflow Vulnerabilities Based on Complete Boundary Test by Li, Zesong, Yang, Hui, Ge, Junwei, Yu, Qinyong

    Published: IEEE 11.12.2020
    “… For this kind of software and its running environment, it is difficult to reduce the false positive rate and false negative rate with traditional static detection method for buffer overflow…”
    Get full text
    Conference Proceeding