Search Results - "buffer overflow attacks"

Refine Results
  1. 1

    Detection of Buffer Overflow Attacks with Memoization-based Rule Set by Özger, Oğuz, Öztekİn, Halit

    ISSN: 2630-5151, 2630-5151
    Published: 30.11.2023
    Published in Journal of Computer Science Research (30.11.2023)
    “…Different abnormalities are commonly encountered in computer network systems. These types of abnormalities can lead to critical data losses or unauthorized…”
    Get full text
    Journal Article
  2. 2

    A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device by Xu, Bin, Wang, Weike, Hao, Qiang, Zhang, Zhun, Du, Pei, Xia, Tongsheng, Li, Hongge, Wang, Xiang

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2018
    Published in IEEE access (2018)
    “…At present, the IoT devices face many kinds of software and hardware attacks, especially buffer overflow attacks…”
    Get full text
    Journal Article
  3. 3

    Defeating buffer overflow attacks via virtualization by Tian, Donghai, Xiong, Xi, Hu, Changzhen, Liu, Peng

    ISSN: 0045-7906, 1879-0755
    Published: Elsevier Ltd 01.08.2014
    Published in Computers & electrical engineering (01.08.2014)
    “… it.•We make use of the virtualization technology to transparently defend against buffer overflow attacks…”
    Get full text
    Journal Article
  4. 4

    Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software by Zili Shao, Xue, C., Zhuge, Q., Qiu, M., Bin Xiao, Sha, E.H.-M.

    ISSN: 0018-9340, 1557-9956
    Published: New York IEEE 01.04.2006
    Published in IEEE transactions on computers (01.04.2006)
    “…With more embedded systems networked, it becomes an important problem to effectively defend embedded systems against buffer overflow attacks…”
    Get full text
    Journal Article
  5. 5

    Characteristics of buffer overflow attacks tunneled in HTTP traffic by Homoliak, Ivan, Ovsonka, Daniel, Koranda, Karel, Hanacek, Petr

    ISBN: 9781479935307, 1479935301
    ISSN: 1071-6572
    Published: IEEE 01.10.2014
    “…The purpose of this article is to describe characteristics of obfuscated network buffer overflow attacks in contrast with characteristics of directly simulated attacks…”
    Get full text
    Conference Proceeding
  6. 6

    Fundamentals of buffer overflow attacks and detection techniques by Bogdan Barchuk

    ISSN: 2581-9615, 2581-9615
    Published: 30.05.2025
    “…Buffer overflows remain a major security risk to software. The article presents the fundamentals of finding buffer overflow weaknesses and methods of analyzing…”
    Get full text
    Journal Article
  7. 7

    Detection of network buffer overflow attacks: A case study by Barabas, Maros, Homoliak, Ivan, Kacic, Matej, Hanicek, Petr

    ISSN: 1071-6572
    Published: IEEE 01.10.2013
    “… We proposed the set of metrics with focus on behavior of buffer overflow attacks and their sufficient description without the need of deep packet inspection…”
    Get full text
    Conference Proceeding
  8. 8

    A New Class of Buffer Overflow Attacks by Kundu, A., Bertino, E.

    ISBN: 1612843840, 9781612843841
    ISSN: 1063-6927
    Published: IEEE 01.06.2011
    “…In this paper, we focus on a class of buffer overflow vulnerabilities that occur due to the "placement new'' expression in C++. "Placement new'' facilitates…”
    Get full text
    Conference Proceeding
  9. 9

    New chips stop buffer overflow attacks by Paulson, L.D.

    ISSN: 0018-9162, 1558-0814
    Published: New York IEEE 01.10.2004
    Published in Computer (Long Beach, Calif.) (01.10.2004)
    “…Chip makers are designing a new generation of microprocessors to stop buffer overflow assaults, exploits that hackers often use to attack and extract data from…”
    Get full text
    Journal Article
  10. 10

    Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks by Park, Y.-J., Zhang, Z., Lee, G.

    ISSN: 0272-1732, 1937-4143
    Published: Los Alamitos IEEE 01.07.2006
    Published in IEEE MICRO (01.07.2006)
    “…Although researchers have proposed several software approaches to preventing buffer overflow attacks, adversaries still extensively exploit this vulnerability…”
    Get full text
    Journal Article
  11. 11

    Buffer overflow attacks : detect, exploit, prevent by Foster, James C.

    ISBN: 9781932266672, 1932266674
    Published: Rockland, Mass Syngress 2005
    “… Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers…”
    Get full text
    eBook Book
  12. 12

    A New Data Randomization Method to Defend Buffer Overflow Attacks by Fen, Yan, Fuchao, Yuan, Xiaobing, Shen, Xinchun, Yin, Bing, Mao

    ISSN: 1875-3892, 1875-3892
    Published: Elsevier B.V 2012
    Published in Physics procedia (2012)
    “…Code injection attack has become a typical representative of the attacks against memory, buffer overflow attacks which is the most commonly used…”
    Get full text
    Journal Article
  13. 13

    Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core by Chenet, Cristiano Pegoraro, Savino, Alessandro, Di Carlo, Stefano

    Published: IEEE 11.03.2025
    “…The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such…”
    Get full text
    Conference Proceeding
  14. 14

    Restore Buffer Overflow Attacks: Breaking Undo-Based Defense Schemes by Lee, Jongmin, Koo, Gunjae

    Published: IEEE 12.01.2022
    “…Transient execution attacks have been severe security threats since such attacks exploit architectural vulnerabilities in out-of-order processors. Researchers…”
    Get full text
    Conference Proceeding
  15. 15

    Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks by Shao, Zili, Cao, Jiannong, Chan, Keith C.C., Xue, Chun, Sha, Edwin H.-M.

    ISSN: 0743-7315, 1096-0848
    Published: Elsevier Inc 01.09.2006
    “…Malicious intrusions by buffer overflow attacks cause serious security problems and pose serious threats for networks and distributed systems such as clusters, Grids and P2P systems. Array…”
    Get full text
    Journal Article
  16. 16

    An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques by Butt, Muhammad Arif, Ajmal, Zarafshan, Khan, Zafar Iqbal, Idrees, Muhammad, Javed, Yasir

    ISSN: 2076-3417, 2076-3417
    Published: Basel MDPI AG 01.07.2022
    Published in Applied sciences (01.07.2022)
    “…Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system…”
    Get full text
    Journal Article
  17. 17

    SQL Injection, Cross-site scripting and Buffer Overflow attacks detection using Machine Learning by Ghannam, Nancy Bou, Salhab, Nazih, Rahman, Maher Abdul

    Published: IEEE 25.10.2022
    “…The frequency and severity of web application attacks are increasing nowadays at an alarming rate. The abundance of electronic services on the internet enables…”
    Get full text
    Conference Proceeding
  18. 18

    On Approaches for Detection and Resolution of Buffer Overflow Attacks by Nayak, Lopamudra, Meghanathan, Natarajan

    ISSN: 2079-2557
    Published: Kohat Kohat University of Science and Technology (KUST) 01.12.2010
    Get full text
    Journal Article
  19. 19

    RAD: a compile-time solution to buffer overflow attacks by Tzi-Cker Chiueh, Fu-Hau Hsu

    ISBN: 0769510779, 9780769510774
    Published: IEEE 2001
    “…Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most common vulnerabilities that can seriously compromise the security of a network-attached computer system…”
    Get full text
    Conference Proceeding
  20. 20

    SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks by Shinagawa, T.

    ISBN: 9780769526775, 0769526772
    ISSN: 1060-9857
    Published: IEEE 01.10.2006
    “…This paper presents a strong and efficient scheme for protecting against buffer overflow attacks…”
    Get full text
    Conference Proceeding