Suchergebnisse - "buffer overflow attacks"

  • Treffer 1 - 18 von 18
Treffer weiter einschränken
  1. 1

    An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques von Butt, Muhammad Arif, Ajmal, Zarafshan, Khan, Zafar Iqbal, Idrees, Muhammad, Javed, Yasir

    ISSN: 2076-3417, 2076-3417
    Veröffentlicht: Basel MDPI AG 01.07.2022
    Veröffentlicht in Applied sciences (01.07.2022)
    “… Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system …”
    Volltext
    Journal Article
  2. 2

    Buffer overflow attack with multiple fault injection and a proven countermeasure von Nashimoto, Shoei, Homma, Naofumi, Hayashi, Yu-ichi, Takahashi, Junko, Fuji, Hitoshi, Aoki, Takafumi

    ISSN: 2190-8508, 2190-8516
    Veröffentlicht: Berlin/Heidelberg Springer Berlin Heidelberg 01.04.2017
    Veröffentlicht in Journal of cryptographic engineering (01.04.2017)
    “… In this paper, we present a hardware/software co-attack to hijack a program flow on microcontrollers. The basic idea is to skip a few instructions using …”
    Volltext
    Journal Article
  3. 3

    SigFree: A Signature-Free Buffer Overflow Attack Blocker von Wang, Xinran, Pan, Chi-Chun, Liu, Peng, Zhu, Sencun

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.01.2010
    “… We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at …”
    Volltext
    Journal Article
  4. 4

    Coping with 0-day attacks through Unsupervised Network Intrusion Detection von Casas, Pedro, Mazel, Johan, Owezarski, Philippe

    ISSN: 2376-6492
    Veröffentlicht: IEEE 01.08.2014
    “… Traditional Network Intrusion Detection Systems (NIDSs) rely on either specialized signatures of previously seen attacks, or on expensive and difficult to …”
    Volltext
    Tagungsbericht
  5. 5

    Binary rewriting and call interception for efficient runtime protection against buffer overflows von Avijit, Kumar, Gupta, Prateek, Gupta, Deepak

    ISSN: 0038-0644, 1097-024X
    Veröffentlicht: Chichester, UK John Wiley & Sons, Ltd 25.07.2006
    Veröffentlicht in Software, practice & experience (25.07.2006)
    “… Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most existing solutions for avoiding …”
    Volltext
    Journal Article
  6. 6

    On the Scalability of HeapCheck von Boivie, Rick, Saileshwar, Gururaj, Chen, Tong, Segal, Benjamin, Buyuktosunoglu, Alper

    Veröffentlicht: IEEE 01.06.2022
    “… In our DSN 2021 paper, we introduced HeapCheck, a combination of hardware and software that provides strong protection against memory-safety vulnerabilities …”
    Volltext
    Tagungsbericht
  7. 7

    MG++: Memory graphs for analyzing dynamic data structures von Singh, Vineet, Gupta, Rajiv, Neamtiu, Iulian

    ISSN: 1534-5351
    Veröffentlicht: IEEE 01.03.2015
    “… Memory graphs are very useful in understanding the behavior of programs that use dynamically allocated data structures. We present a new memory graph …”
    Volltext
    Tagungsbericht
  8. 8

    Scalable network-based buffer overflow attack detection von Hsu, Fu-Hau, Guo, Fanglu, Chiueh, Tzi-cker

    ISBN: 9781595935809, 1595935800
    Veröffentlicht: New York, NY, USA ACM 03.12.2006
    “… Buffer overflow attack is the main attack method that most if not all existing malicious worms use to propagate themselves from machine to machine. Although a …”
    Volltext
    Tagungsbericht
  9. 9

    Buffer-Overflow Protection: The Theory von Piromsopa, K., Enbody, R.J.

    ISBN: 0780395921, 9780780395923
    ISSN: 2154-0357
    Veröffentlicht: IEEE 01.05.2006
    “… We propose a framework for protecting against buffer overflow attacks the oldest and most pervasive attack technique. The malicious nature of buffer-overflow …”
    Volltext
    Tagungsbericht
  10. 10

    Arbitrary Copy: Bypassing Buffer-Overflow Protections von Piromsopa, K., Enbody, R.J.

    ISBN: 0780395921, 9780780395923
    ISSN: 2154-0357
    Veröffentlicht: IEEE 01.05.2006
    “… Recent advances in buffer-overflow protection are able to eliminate several common types of buffer-overflow attacks (e.g. stack smashing, jump table). In this …”
    Volltext
    Tagungsbericht
  11. 11

    Nile: A Programmable Monitoring Coprocessor von Delshadtehrani, Leila, Eldridge, Schuyler, Canakci, Sadullah, Egele, Manuel, Joshi, Ajay

    ISSN: 1556-6056, 1556-6064
    Veröffentlicht: New York IEEE 01.01.2018
    Veröffentlicht in IEEE computer architecture letters (01.01.2018)
    “… Researchers widely employ hardware performance counters (HPCs) as well as debugging and profiling tools in processors for monitoring different events such as …”
    Volltext
    Journal Article
  12. 12

    Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software von Zili Shao, Xue, C., Zhuge, Q., Qiu, M., Bin Xiao, Sha, E.H.-M.

    ISSN: 0018-9340, 1557-9956
    Veröffentlicht: New York IEEE 01.04.2006
    Veröffentlicht in IEEE transactions on computers (01.04.2006)
    “… With more embedded systems networked, it becomes an important problem to effectively defend embedded systems against buffer overflow attacks. Due to the …”
    Volltext
    Journal Article
  13. 13
  14. 14

    HSP: A solution against heap sprays von Hsu, Fu-Hau, Huang, Cheng-Hsien, Hsu, Chi-Hsien, Ou, Chih-Wen, Chen, Li-Han, Chiu, Ping-Cheng

    ISSN: 0164-1212, 1873-1228
    Veröffentlicht: New York Elsevier Inc 01.11.2010
    Veröffentlicht in The Journal of systems and software (01.11.2010)
    “… Heap sprays are a new buffer overflow attack (BOA) form that can significantly increase the successful chance of a BOA even though the attacked process is …”
    Volltext
    Journal Article
  15. 15

    Experimental Evaluation of the Defense Capability of ARM-based Systems against Buffer Overflow Attacks in Wireless Networks von Zhou, Sun, Chen, Jun

    ISBN: 9781728163123, 1728163129
    ISSN: 2377-844X
    Veröffentlicht: IEEE 01.07.2020
    “… Buffer overflow attack is one of the mainstream attacks towards the ARM architecture. It may lead to consequences such as program failure or system privileges …”
    Volltext
    Tagungsbericht
  16. 16

    A Mathematical Model of Mitigating Memory Randomization Weakness via Moving Target Defense von Aldossary, Sultan, Allen, William, Zhang, Shengzhi

    Veröffentlicht: IEEE 01.12.2017
    “… The address space randomization technique was proposed to make determining the address of a shared library more difficult since each instance of the program is …”
    Volltext
    Tagungsbericht
  17. 17

    AIFD: A Runtime Solution to Buffer Overflow Attack von Hong Han, Xian-Liang Lu, Li-Yong Ren, Bo Chen, Ning Yang

    ISBN: 1424409721, 9781424409723
    ISSN: 2160-133X
    Veröffentlicht: IEEE 01.08.2007
    “… While buffer overflow problem has been known for a long time, it continues to present a serious security threat. Many solutions to the notorious problem were …”
    Volltext
    Tagungsbericht
  18. 18

    Autocorrelation Change Characteristics of Attack and Normal Use Data von Ye, Nong

    ISBN: 9780470023242, 0470023244
    Veröffentlicht: Chichester, UK John Wiley & Sons, Ltd 08.01.2008
    “… This chapter contains sections titled: The autocorrelation feature of data Discovering the autocorrelation change characteristics for attacks Autocorrelation …”
    Volltext
    Buchkapitel