Search Results - "Stack buffer overflow"

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Exploiting stack-based buffer overflow using modern day techniques by Nicula, Ștefan, Zota, Răzvan Daniel

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2019
    Published in Procedia computer science (2019)
    “…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow. The buffer overflow occurs when a…”
    Get full text
    Journal Article
  2. 2

    Nile: A Programmable Monitoring Coprocessor by Delshadtehrani, Leila, Eldridge, Schuyler, Canakci, Sadullah, Egele, Manuel, Joshi, Ajay

    ISSN: 1556-6056, 1556-6064
    Published: New York IEEE 01.01.2018
    Published in IEEE computer architecture letters (01.01.2018)
    “…Researchers widely employ hardware performance counters (HPCs) as well as debugging and profiling tools in processors for monitoring different events such as…”
    Get full text
    Journal Article
  3. 3

    To Detect Stack Buffer Overflow with Polymorphic Canaries by Wang, Zhilong, Ding, Xuhua, Pang, Chengbin, Guo, Jian, Zhu, Jun, Mao, Bing

    ISSN: 2158-3927
    Published: IEEE 01.06.2018
    “…Stack Smashing Protection (SSP) is a simple and highly efficient technique widely used in practice as the front line defense against stack buffer overflow…”
    Get full text
    Conference Proceeding
  4. 4

    Leveraging microarchitectural side channel information to efficiently enhance program control flow integrity by Chen Liu, Chengmo Yang, Yuanqi Shen

    Published: ACM 01.10.2014
    “…Stack buffer overflow is a serious security threat to program execution. A malicious attacker may overwrite the return address of a procedure to alter its…”
    Get full text
    Conference Proceeding
  5. 5

    Window Canaries: Re-thinking Stack Canaries for Architectures with Register Windows by Lehniger, Kai, Langendorfer, Peter

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.11.2023
    “…This paper presents Window Canaries, a novel approach to Stack Canaries for architectures with a register window that protects return addresses and stack…”
    Get full text
    Journal Article
  6. 6

    A Review of Memory Errors Exploitation in x86-64 by Pirry, Conor, Marco-Gisbert, Hector, Begg, Carolyn

    ISSN: 2073-431X, 2073-431X
    Published: Basel MDPI AG 01.06.2020
    Published in Computers (Basel) (01.06.2020)
    “…Memory errors are still a serious threat affecting millions of devices worldwide. Recently, bounty programs have reached a new record, paying up to USD 2.5…”
    Get full text
    Journal Article