Výsledky vyhledávání - "buffer overflow vulnerability"
-
1
A multitype software buffer overflow vulnerability prediction method based on a software graph structure and a self-attentive graph neural network
ISSN: 0950-5849, 1873-6025Vydáno: Elsevier B.V 01.08.2023Vydáno v Information and software technology (01.08.2023)“…•A method for predicting buffer overflow vulnerabilities in multiple types of software is proposed.•A software vulnerability feature set called GSVFset is…”
Získat plný text
Journal Article -
2
Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
ISSN: 1999-5903, 1999-5903Vydáno: Basel MDPI AG 01.05.2023Vydáno v Future internet (01.05.2023)“…Advanced Driver Assistance Systems (ADASs) are crucial components of intelligent vehicles, equipped with a vast code base. To enhance the security of ADASs, it…”
Získat plný text
Journal Article -
3
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
ISSN: 1545-5971, 1941-0018Vydáno: Washington IEEE 01.11.2013Vydáno v IEEE transactions on dependable and secure computing (01.11.2013)“…Buffer overflow attacks still pose a significant threat to the security and availability of today's computer systems. Although there are a number of solutions…”
Získat plný text
Journal Article -
4
Smart fuzzing method for detecting stack-based buffer overflow in binary codes
ISSN: 1751-8806, 1751-8814, 1751-8814Vydáno: The Institution of Engineering and Technology 01.08.2016Vydáno v IET software (01.08.2016)“…During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the…”
Získat plný text
Journal Article -
5
Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis
ISSN: 1751-8806, 1751-8814, 1751-8814Vydáno: The Institution of Engineering and Technology 01.04.2016Vydáno v IET software (01.04.2016)“…Buffer overflow (BOF) vulnerabilities when present in code can be exploited to violate security objectives such as availability, confidentiality and integrity…”
Získat plný text
Journal Article -
6
A combinatorial approach to detecting buffer overflow vulnerabilities
ISBN: 9781424492329, 1424492327ISSN: 1530-0889Vydáno: IEEE 01.06.2011Vydáno v 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN) (01.06.2011)“…Buffer overflow vulnerabilities are program defects that can cause a buffer to overflow at runtime. Many security attacks exploit buffer overflow…”
Získat plný text
Konferenční příspěvek -
7
Buffer Overflow Vulnerability Detection Based on Static Analysis-assisted Symbolic Execution
Vydáno: IEEE 18.08.2023Vydáno v 2023 4th International Symposium on Computer Engineering and Intelligent Communications (ISCEIC) (18.08.2023)“…Buffer overflow is a common exploitable high-risk vulnerability that can lead to arbitrary code execution, thus effective detection of buffer overflow…”
Získat plný text
Konferenční příspěvek -
8
Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
Vydáno: IEEE 01.03.2019Vydáno v 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) (01.03.2019)“…As a modern power transmission network, smart grid connects plenty of terminal devices. However, along with the growth of devices are the security threats…”
Získat plný text
Konferenční příspěvek -
9
Detecting integer overflow in Windows binary executables based on symbolic execution
Vydáno: IEEE 01.05.2016Vydáno v 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD) (01.05.2016)“…The integer overflow vulnerabilities exist in Windows binary executables still take up a large proportion of software security vulnerabilities. As integer…”
Získat plný text
Konferenční příspěvek -
10
Identifying buffer overflow vulnerabilities based on binary code
ISBN: 9781424487271, 1424487277Vydáno: IEEE 01.06.2011Vydáno v 2011 IEEE International Conference on Computer Science and Automation Engineering (01.06.2011)“…Buffer overflow attack is the most common and arguably the most dangerous attack method. The buffer overflow detecting will play a significant role in network…”
Získat plný text
Konferenční příspěvek -
11
Goal-oriented dynamic test generation
ISSN: 0950-5849, 1873-6025Vydáno: Amsterdam Elsevier B.V 01.10.2015Vydáno v Information and software technology (01.10.2015)“…Memory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats. Detecting and removing such security…”
Získat plný text
Journal Article -
12
CorCA: An Automatic Program Repair Tool for Checking and Removing Effectively C Flaws
Vydáno: IEEE 01.04.2023Vydáno v 2023 IEEE Conference on Software Testing, Verification and Validation (ICST) (01.04.2023)“…Embedded systems are present in many devices, such as the Internet of Things, drones, and cyber-physical systems. The software security of these devices can be…”
Získat plný text
Konferenční příspěvek -
13
Effectiveness on C Flaws Checking and Removal
Vydáno: IEEE 01.06.2022Vydáno v 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S) (01.06.2022)“…The use of software daily has become inevitable nowadays. Almost all everyday tools and the most different areas (e.g., medicine or telecommunications) are…”
Získat plný text
Konferenční příspěvek -
14
Host‐Level Threats and Vulnerabilities
ISBN: 0470519886, 9780470519882Vydáno: Chichester, UK John Wiley & Sons, Ltd 13.02.2009Vydáno v Distributed Systems Security: Issues, Processes and Solutions (13.02.2009)“…This chapter contains sections titled: Background Malware Eavesdropping Job Faults Resource Starvation Overflow Privilege Escalation Injection Attacks…”
Získat plný text
Kapitola

