Suchergebnisse - "buffer overflow attacks"
-
1
An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques
ISSN: 2076-3417, 2076-3417Veröffentlicht: Basel MDPI AG 01.07.2022Veröffentlicht in Applied sciences (01.07.2022)“… Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system …”
Volltext
Journal Article -
2
Buffer overflow attack with multiple fault injection and a proven countermeasure
ISSN: 2190-8508, 2190-8516Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2017Veröffentlicht in Journal of cryptographic engineering (01.04.2017)“… In this paper, we present a hardware/software co-attack to hijack a program flow on microcontrollers. The basic idea is to skip a few instructions using …”
Volltext
Journal Article -
3
SigFree: A Signature-Free Buffer Overflow Attack Blocker
ISSN: 1545-5971, 1941-0018Veröffentlicht: Washington IEEE 01.01.2010Veröffentlicht in IEEE transactions on dependable and secure computing (01.01.2010)“… We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at …”
Volltext
Journal Article -
4
Coping with 0-day attacks through Unsupervised Network Intrusion Detection
ISSN: 2376-6492Veröffentlicht: IEEE 01.08.2014Veröffentlicht in 2014 International Wireless Communications and Mobile Computing Conference (IWCMC) (01.08.2014)“… Traditional Network Intrusion Detection Systems (NIDSs) rely on either specialized signatures of previously seen attacks, or on expensive and difficult to …”
Volltext
Tagungsbericht -
5
Binary rewriting and call interception for efficient runtime protection against buffer overflows
ISSN: 0038-0644, 1097-024XVeröffentlicht: Chichester, UK John Wiley & Sons, Ltd 25.07.2006Veröffentlicht in Software, practice & experience (25.07.2006)“… Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most existing solutions for avoiding …”
Volltext
Journal Article -
6
On the Scalability of HeapCheck
Veröffentlicht: IEEE 01.06.2022Veröffentlicht in 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S) (01.06.2022)“… In our DSN 2021 paper, we introduced HeapCheck, a combination of hardware and software that provides strong protection against memory-safety vulnerabilities …”
Volltext
Tagungsbericht -
7
MG++: Memory graphs for analyzing dynamic data structures
ISSN: 1534-5351Veröffentlicht: IEEE 01.03.2015Veröffentlicht in Proceedings of the European Conference on Software Maintenance and Reengineering (01.03.2015)“… Memory graphs are very useful in understanding the behavior of programs that use dynamically allocated data structures. We present a new memory graph …”
Volltext
Tagungsbericht -
8
Scalable network-based buffer overflow attack detection
ISBN: 9781595935809, 1595935800Veröffentlicht: New York, NY, USA ACM 03.12.2006Veröffentlicht in ANCS 2006 : proceedings of the 2006 ACM/IEEE Symposium on Architectures for Networking and Communications Systems : December 3-5, 2006, San Jose, California, USA (03.12.2006)“… Buffer overflow attack is the main attack method that most if not all existing malicious worms use to propagate themselves from machine to machine. Although a …”
Volltext
Tagungsbericht -
9
Buffer-Overflow Protection: The Theory
ISBN: 0780395921, 9780780395923ISSN: 2154-0357Veröffentlicht: IEEE 01.05.2006Veröffentlicht in 2006 IEEE International Conference on Electro/Information Technology (01.05.2006)“… We propose a framework for protecting against buffer overflow attacks the oldest and most pervasive attack technique. The malicious nature of buffer-overflow …”
Volltext
Tagungsbericht -
10
Arbitrary Copy: Bypassing Buffer-Overflow Protections
ISBN: 0780395921, 9780780395923ISSN: 2154-0357Veröffentlicht: IEEE 01.05.2006Veröffentlicht in 2006 IEEE International Conference on Electro/Information Technology (01.05.2006)“… Recent advances in buffer-overflow protection are able to eliminate several common types of buffer-overflow attacks (e.g. stack smashing, jump table). In this …”
Volltext
Tagungsbericht -
11
Nile: A Programmable Monitoring Coprocessor
ISSN: 1556-6056, 1556-6064Veröffentlicht: New York IEEE 01.01.2018Veröffentlicht in IEEE computer architecture letters (01.01.2018)“… Researchers widely employ hardware performance counters (HPCs) as well as debugging and profiling tools in processors for monitoring different events such as …”
Volltext
Journal Article -
12
Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
ISSN: 0018-9340, 1557-9956Veröffentlicht: New York IEEE 01.04.2006Veröffentlicht in IEEE transactions on computers (01.04.2006)“… With more embedded systems networked, it becomes an important problem to effectively defend embedded systems against buffer overflow attacks. Due to the …”
Volltext
Journal Article -
13
ShadowStack: A new approach for secure program execution
ISSN: 0026-2714Veröffentlicht: 01.08.2015Veröffentlicht in Microelectronics and reliability (01.08.2015)Volltext
Journal Article -
14
HSP: A solution against heap sprays
ISSN: 0164-1212, 1873-1228Veröffentlicht: New York Elsevier Inc 01.11.2010Veröffentlicht in The Journal of systems and software (01.11.2010)“… Heap sprays are a new buffer overflow attack (BOA) form that can significantly increase the successful chance of a BOA even though the attacked process is …”
Volltext
Journal Article -
15
Experimental Evaluation of the Defense Capability of ARM-based Systems against Buffer Overflow Attacks in Wireless Networks
ISBN: 9781728163123, 1728163129ISSN: 2377-844XVeröffentlicht: IEEE 01.07.2020Veröffentlicht in IEEE International Conference on Electronics Information and Emergency Communication (Online) (01.07.2020)“… Buffer overflow attack is one of the mainstream attacks towards the ARM architecture. It may lead to consequences such as program failure or system privileges …”
Volltext
Tagungsbericht -
16
A Mathematical Model of Mitigating Memory Randomization Weakness via Moving Target Defense
Veröffentlicht: IEEE 01.12.2017Veröffentlicht in 2017 International Conference on Computational Science and Computational Intelligence (CSCI) (01.12.2017)“… The address space randomization technique was proposed to make determining the address of a shared library more difficult since each instance of the program is …”
Volltext
Tagungsbericht -
17
AIFD: A Runtime Solution to Buffer Overflow Attack
ISBN: 1424409721, 9781424409723ISSN: 2160-133XVeröffentlicht: IEEE 01.08.2007Veröffentlicht in 2007 International Conference on Machine Learning and Cybernetics (01.08.2007)“… While buffer overflow problem has been known for a long time, it continues to present a serious security threat. Many solutions to the notorious problem were …”
Volltext
Tagungsbericht -
18
Autocorrelation Change Characteristics of Attack and Normal Use Data
ISBN: 9780470023242, 0470023244Veröffentlicht: Chichester, UK John Wiley & Sons, Ltd 08.01.2008Veröffentlicht in Secure Computer and Network Systems: Modeling, Analysis and Design (08.01.2008)“… This chapter contains sections titled: The autocorrelation feature of data Discovering the autocorrelation change characteristics for attacks Autocorrelation …”
Volltext
Buchkapitel

