Search Results - "Stack buffer overflow"
-
1
Exploiting stack-based buffer overflow using modern day techniques
ISSN: 1877-0509, 1877-0509Published: Elsevier B.V 2019Published in Procedia computer science (2019)“…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow. The buffer overflow occurs when a…”
Get full text
Journal Article -
2
Nile: A Programmable Monitoring Coprocessor
ISSN: 1556-6056, 1556-6064Published: New York IEEE 01.01.2018Published in IEEE computer architecture letters (01.01.2018)“…Researchers widely employ hardware performance counters (HPCs) as well as debugging and profiling tools in processors for monitoring different events such as…”
Get full text
Journal Article -
3
To Detect Stack Buffer Overflow with Polymorphic Canaries
ISSN: 2158-3927Published: IEEE 01.06.2018Published in Proceedings - International Conference on Dependable Systems and Networks (01.06.2018)“…Stack Smashing Protection (SSP) is a simple and highly efficient technique widely used in practice as the front line defense against stack buffer overflow…”
Get full text
Conference Proceeding -
4
Leveraging microarchitectural side channel information to efficiently enhance program control flow integrity
Published: ACM 01.10.2014Published in 2014 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS) : October 12-17, 2014, Jaypee Greens Golf and Spa Resort, New Delhi, India (01.10.2014)“…Stack buffer overflow is a serious security threat to program execution. A malicious attacker may overwrite the return address of a procedure to alter its…”
Get full text
Conference Proceeding -
5
Window Canaries: Re-thinking Stack Canaries for Architectures with Register Windows
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.11.2023Published in IEEE transactions on dependable and secure computing (01.11.2023)“…This paper presents Window Canaries, a novel approach to Stack Canaries for architectures with a register window that protects return addresses and stack…”
Get full text
Journal Article -
6
A Review of Memory Errors Exploitation in x86-64
ISSN: 2073-431X, 2073-431XPublished: Basel MDPI AG 01.06.2020Published in Computers (Basel) (01.06.2020)“…Memory errors are still a serious threat affecting millions of devices worldwide. Recently, bounty programs have reached a new record, paying up to USD 2.5…”
Get full text
Journal Article