Search Results - "buffer overflow attacks"
-
1
Detection of Buffer Overflow Attacks with Memoization-based Rule Set
ISSN: 2630-5151, 2630-5151Published: 30.11.2023Published in Journal of Computer Science Research (30.11.2023)“…Different abnormalities are commonly encountered in computer network systems. These types of abnormalities can lead to critical data losses or unauthorized…”
Get full text
Journal Article -
2
A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2018Published in IEEE access (2018)“…At present, the IoT devices face many kinds of software and hardware attacks, especially buffer overflow attacks…”
Get full text
Journal Article -
3
Defeating buffer overflow attacks via virtualization
ISSN: 0045-7906, 1879-0755Published: Elsevier Ltd 01.08.2014Published in Computers & electrical engineering (01.08.2014)“… it.•We make use of the virtualization technology to transparently defend against buffer overflow attacks…”
Get full text
Journal Article -
4
Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
ISSN: 0018-9340, 1557-9956Published: New York IEEE 01.04.2006Published in IEEE transactions on computers (01.04.2006)“…With more embedded systems networked, it becomes an important problem to effectively defend embedded systems against buffer overflow attacks…”
Get full text
Journal Article -
5
Characteristics of buffer overflow attacks tunneled in HTTP traffic
ISBN: 9781479935307, 1479935301ISSN: 1071-6572Published: IEEE 01.10.2014Published in Proceedings - International Carnahan Conference on Security Technology (01.10.2014)“…The purpose of this article is to describe characteristics of obfuscated network buffer overflow attacks in contrast with characteristics of directly simulated attacks…”
Get full text
Conference Proceeding -
6
Fundamentals of buffer overflow attacks and detection techniques
ISSN: 2581-9615, 2581-9615Published: 30.05.2025Published in World Journal of Advanced Research and Reviews (30.05.2025)“…Buffer overflows remain a major security risk to software. The article presents the fundamentals of finding buffer overflow weaknesses and methods of analyzing…”
Get full text
Journal Article -
7
Detection of network buffer overflow attacks: A case study
ISSN: 1071-6572Published: IEEE 01.10.2013Published in 2013 47th International Carnahan Conference on Security Technology (ICCST) (01.10.2013)“… We proposed the set of metrics with focus on behavior of buffer overflow attacks and their sufficient description without the need of deep packet inspection…”
Get full text
Conference Proceeding -
8
A New Class of Buffer Overflow Attacks
ISBN: 1612843840, 9781612843841ISSN: 1063-6927Published: IEEE 01.06.2011Published in 2011 31st International Conference on Distributed Computing Systems (01.06.2011)“…In this paper, we focus on a class of buffer overflow vulnerabilities that occur due to the "placement new'' expression in C++. "Placement new'' facilitates…”
Get full text
Conference Proceeding -
9
New chips stop buffer overflow attacks
ISSN: 0018-9162, 1558-0814Published: New York IEEE 01.10.2004Published in Computer (Long Beach, Calif.) (01.10.2004)“…Chip makers are designing a new generation of microprocessors to stop buffer overflow assaults, exploits that hackers often use to attack and extract data from…”
Get full text
Journal Article -
10
Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks
ISSN: 0272-1732, 1937-4143Published: Los Alamitos IEEE 01.07.2006Published in IEEE MICRO (01.07.2006)“…Although researchers have proposed several software approaches to preventing buffer overflow attacks, adversaries still extensively exploit this vulnerability…”
Get full text
Journal Article -
11
Buffer overflow attacks : detect, exploit, prevent
ISBN: 9781932266672, 1932266674Published: Rockland, Mass Syngress 2005“… Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers…”
Get full text
eBook Book -
12
A New Data Randomization Method to Defend Buffer Overflow Attacks
ISSN: 1875-3892, 1875-3892Published: Elsevier B.V 2012Published in Physics procedia (2012)“…Code injection attack has become a typical representative of the attacks against memory, buffer overflow attacks which is the most commonly used…”
Get full text
Journal Article -
13
Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core
Published: IEEE 11.03.2025Published in 2025 IEEE 26th Latin American Test Symposium (LATS) (11.03.2025)“…The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such…”
Get full text
Conference Proceeding -
14
Restore Buffer Overflow Attacks: Breaking Undo-Based Defense Schemes
Published: IEEE 12.01.2022Published in 2022 International Conference on Information Networking (ICOIN) (12.01.2022)“…Transient execution attacks have been severe security threats since such attacks exploit architectural vulnerabilities in out-of-order processors. Researchers…”
Get full text
Conference Proceeding -
15
Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks
ISSN: 0743-7315, 1096-0848Published: Elsevier Inc 01.09.2006Published in Journal of parallel and distributed computing (01.09.2006)“…Malicious intrusions by buffer overflow attacks cause serious security problems and pose serious threats for networks and distributed systems such as clusters, Grids and P2P systems. Array…”
Get full text
Journal Article -
16
An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques
ISSN: 2076-3417, 2076-3417Published: Basel MDPI AG 01.07.2022Published in Applied sciences (01.07.2022)“…Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system…”
Get full text
Journal Article -
17
SQL Injection, Cross-site scripting and Buffer Overflow attacks detection using Machine Learning
Published: IEEE 25.10.2022Published in 2022 International Conference on Data Analytics for Business and Industry (ICDABI) (25.10.2022)“…The frequency and severity of web application attacks are increasing nowadays at an alarming rate. The abundance of electronic services on the internet enables…”
Get full text
Conference Proceeding -
18
On Approaches for Detection and Resolution of Buffer Overflow Attacks
ISSN: 2079-2557Published: Kohat Kohat University of Science and Technology (KUST) 01.12.2010Published in International journal of research and reviews in computer science (01.12.2010)Get full text
Journal Article -
19
RAD: a compile-time solution to buffer overflow attacks
ISBN: 0769510779, 9780769510774Published: IEEE 2001Published in 21st International Conference on Distributed Computing Systems (ICDCS 2001) (2001)“…Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most common vulnerabilities that can seriously compromise the security of a network-attached computer system…”
Get full text
Conference Proceeding -
20
SegmentShield: Exploiting Segmentation Hardware for Protecting against Buffer Overflow Attacks
ISBN: 9780769526775, 0769526772ISSN: 1060-9857Published: IEEE 01.10.2006Published in 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06) (01.10.2006)“…This paper presents a strong and efficient scheme for protecting against buffer overflow attacks…”
Get full text
Conference Proceeding

