Výsledky vyhledávání - "buffer overflow vulnerability"

  1. 1

    BovdGFE: buffer overflow vulnerability detection based on graph feature extraction Autor Lv, Xinghang, Peng, Tao, Chen, Jia, Liu, Junping, Hu, Xinrong, He, Ruhan, Jiang, Minghua, Cao, Wenli

    ISSN: 0924-669X, 1573-7497
    Vydáno: New York Springer US 01.06.2023
    “…Automatically detecting buffer overflow vulnerabilities is an important research topic in software security…”
    Získat plný text
    Journal Article
  2. 2

    A multitype software buffer overflow vulnerability prediction method based on a software graph structure and a self-attentive graph neural network Autor Zheng, Zhangqi, Liu, Yongshan, Zhang, Bing, Liu, Xinqian, He, Hongyan, Gong, Xiang

    ISSN: 0950-5849, 1873-6025
    Vydáno: Elsevier B.V 01.08.2023
    Vydáno v Information and software technology (01.08.2023)
    “…•A method for predicting buffer overflow vulnerabilities in multiple types of software is proposed…”
    Získat plný text
    Journal Article
  3. 3

    Techniques for Defending from Buffer Overflow Vulnerability Security Exploits Autor Padmanabhuni, Bindu, Tan, Hee Beng Kuan

    ISSN: 1089-7801, 1941-0131
    Vydáno: IEEE 2019
    Vydáno v IEEE internet computing (2019)
    “… Buffer overflow vulnerability is the most severe of security violations. Though wide range of solutions from static analysis techniques to hardware modifications…”
    Získat plný text
    Journal Article
  4. 4

    Buffer Overflow Vulnerability Detection Based on Unsafe Function Invocation Autor Zhao, Xianda, Huang, Shuguang, Pan, Zulie, Hui, Huang

    ISSN: 1742-6588, 1742-6596
    Vydáno: Bristol IOP Publishing 01.06.2020
    Vydáno v Journal of physics. Conference series (01.06.2020)
    “…Buffer overflow vulnerabilities are widespread in software programs and pose a serious security threat…”
    Získat plný text
    Journal Article
  5. 5

    BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis Autor Xu, Shenglin, Wang, Yongjun

    ISSN: 1939-0114, 1939-0122
    Vydáno: London Hindawi 22.06.2022
    Vydáno v Security and communication networks (22.06.2022)
    “…Stack buffer overflow vulnerability is a common software vulnerability that can overwrite function return addresses and hijack program control flow, causing serious system problems…”
    Získat plný text
    Journal Article
  6. 6

    Automatic Repair Method for D2D Communication Routing Buffer Overflow Vulnerability in Cellular Network Autor Yang, BaoPing, Jiang, Kun

    ISSN: 1058-9244, 1875-919X
    Vydáno: New York Hindawi 20.12.2021
    Vydáno v Scientific programming (20.12.2021)
    “…Repairing D2D communication routing buffer overflow in a cellular network is of great significance in improving communication quality and security. Due to the…”
    Získat plný text
    Journal Article
  7. 7
  8. 8
  9. 9

    Research on Buffer Overflow Vulnerability Mining Method Based on Deep Learning Autor Yongxu, Hou, Ying, Zhou, Pengzhi, Xu, Zhen, Guo

    Vydáno: IEEE 10.01.2024
    “…Buffer overflow vulnerability is the most widespread and destructive vulnerability in software security, the existing mining methods need to manually analyze the program code based on preset rules…”
    Získat plný text
    Konferenční příspěvek
  10. 10

    Buffer Overflow Vulnerability Detection Based on Static Analysis-assisted Symbolic Execution Autor Wang, Wenhui, Zhwng, PEngland, Wei, Guichen, Ge, Zhenwei, Qin, Zhongyuan, Sun, Xin

    Vydáno: IEEE 18.08.2023
    “…Buffer overflow is a common exploitable high-risk vulnerability that can lead to arbitrary code execution, thus effective detection of buffer overflow vulnerability is of utmost importance…”
    Získat plný text
    Konferenční příspěvek
  11. 11

    Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks Autor Akter, Mst Shapna, Shahriar, Hossain, Cardenas, Juan Rodriguez, Iqbal Ahamed, Sheikh, Cuzzocrea, Alfredo

    Vydáno: IEEE 01.06.2023
    “…One of the most significant challenges in the field of software code auditing is the presence of vulnerabilities in software source code. Every year, more and…”
    Získat plný text
    Konferenční příspěvek
  12. 12

    A Preliminary Study on Common Programming Mistakes that Lead to Buffer Overflow Vulnerability Autor George, Giovanni, Kotey, Jeremiah, Ripley, Megan, Sultana, Kazi Zakia, Codabux, Zadia

    Vydáno: IEEE 01.07.2021
    “…When vulnerabilities are exploited, the impact can be insignificant or detrimental, depending on the attack's nature. Research found that buffer overflow is…”
    Získat plný text
    Konferenční příspěvek
  13. 13

    Buffer Overflow Vulnerability Location in Binaries Based on Abnormal Execution Autor Gao, Tian, Guo, Xi

    Vydáno: IEEE 01.09.2020
    “…Buffer overflow is a very common and dangerous vulnerability. Now there are many methods and tools for this vulnerability, but it is difficult to locate it in…”
    Získat plný text
    Konferenční příspěvek
  14. 14

    Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs Autor Li, Yufeng, Liu, Mengxiao, Cao, Chenhong, Li, Jiangtao

    ISSN: 1999-5903, 1999-5903
    Vydáno: Basel MDPI AG 01.05.2023
    Vydáno v Future internet (01.05.2023)
    “…Advanced Driver Assistance Systems (ADASs) are crucial components of intelligent vehicles, equipped with a vast code base. To enhance the security of ADASs, it…”
    Získat plný text
    Journal Article
  15. 15

    SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities Autor Chen, Gang, Jin, Hai, Zou, Deqing, Zhou, Bing Bing, Liang, Zhenkai, Zheng, Weide, Shi, Xuanhua

    ISSN: 1545-5971, 1941-0018
    Vydáno: Washington IEEE 01.11.2013
    “… This paper presents SafeStack, a system that can automatically diagnose and patch stack-based buffer overflow vulnerabilities…”
    Získat plný text
    Journal Article
  16. 16

    Buffer Overflow Vulnerability Prediction from x86 Executables Using Static Analysis and Machine Learning Autor Padmanabhuni, Bindu Madhavi, Hee Beng Kuan Tan

    ISSN: 0730-3157
    Vydáno: IEEE 01.07.2015
    “… We investigate the use of static analysis and machine learning for predicting buffer overflow vulnerabilities from binaries in this study…”
    Získat plný text
    Konferenční příspěvek Journal Article
  17. 17

    Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks Autor Akter, Mst Shapna, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Cuzzocrea, Alfredo

    ISSN: 2331-8422
    Vydáno: Ithaca Cornell University Library, arXiv.org 01.06.2023
    Vydáno v arXiv.org (01.06.2023)
    “…One of the most significant challenges in the field of software code auditing is the presence of vulnerabilities in software source code. Every year, more and…”
    Získat plný text
    Paper
  18. 18

    Smart fuzzing method for detecting stack-based buffer overflow in binary codes Autor Mouzarani, Maryam, Sadeghiyan, Babak, Zolfaghari, Mohammad

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Vydáno: The Institution of Engineering and Technology 01.08.2016
    Vydáno v IET software (01.08.2016)
    “…During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the computer systems…”
    Získat plný text
    Journal Article
  19. 19

    Modelling Binary Oriented Software Buffer-Overflow Vulnerability in Process Algebra Autor Wenqing Liu, Liming Yang, Wei Zhang

    ISSN: 2168-3042
    Vydáno: IEEE 01.12.2015
    “…Software is ubiquitous in numerous industries, such as financial and commercial industries and military industries, playing the manager role to manipulate the…”
    Získat plný text
    Konferenční příspěvek
  20. 20

    Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis Autor Padmanabhuni, Bindu Madhavi, Tan, Hee Beng Kuan

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Vydáno: The Institution of Engineering and Technology 01.04.2016
    Vydáno v IET software (01.04.2016)
    “…Buffer overflow (BOF) vulnerabilities when present in code can be exploited to violate security objectives such as availability, confidentiality and integrity…”
    Získat plný text
    Journal Article