Výsledky vyhledávání - "buffer overflow vulnerability"

  • Zobrazuji výsledky 1 - 14 z 14
Upřesnit hledání
  1. 1

    A multitype software buffer overflow vulnerability prediction method based on a software graph structure and a self-attentive graph neural network Autor Zheng, Zhangqi, Liu, Yongshan, Zhang, Bing, Liu, Xinqian, He, Hongyan, Gong, Xiang

    ISSN: 0950-5849, 1873-6025
    Vydáno: Elsevier B.V 01.08.2023
    Vydáno v Information and software technology (01.08.2023)
    “…•A method for predicting buffer overflow vulnerabilities in multiple types of software is proposed.•A software vulnerability feature set called GSVFset is…”
    Získat plný text
    Journal Article
  2. 2

    Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs Autor Li, Yufeng, Liu, Mengxiao, Cao, Chenhong, Li, Jiangtao

    ISSN: 1999-5903, 1999-5903
    Vydáno: Basel MDPI AG 01.05.2023
    Vydáno v Future internet (01.05.2023)
    “…Advanced Driver Assistance Systems (ADASs) are crucial components of intelligent vehicles, equipped with a vast code base. To enhance the security of ADASs, it…”
    Získat plný text
    Journal Article
  3. 3

    SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities Autor Chen, Gang, Jin, Hai, Zou, Deqing, Zhou, Bing Bing, Liang, Zhenkai, Zheng, Weide, Shi, Xuanhua

    ISSN: 1545-5971, 1941-0018
    Vydáno: Washington IEEE 01.11.2013
    “…Buffer overflow attacks still pose a significant threat to the security and availability of today's computer systems. Although there are a number of solutions…”
    Získat plný text
    Journal Article
  4. 4

    Smart fuzzing method for detecting stack-based buffer overflow in binary codes Autor Mouzarani, Maryam, Sadeghiyan, Babak, Zolfaghari, Mohammad

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Vydáno: The Institution of Engineering and Technology 01.08.2016
    Vydáno v IET software (01.08.2016)
    “…During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the…”
    Získat plný text
    Journal Article
  5. 5

    Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis Autor Padmanabhuni, Bindu Madhavi, Tan, Hee Beng Kuan

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Vydáno: The Institution of Engineering and Technology 01.04.2016
    Vydáno v IET software (01.04.2016)
    “…Buffer overflow (BOF) vulnerabilities when present in code can be exploited to violate security objectives such as availability, confidentiality and integrity…”
    Získat plný text
    Journal Article
  6. 6

    A combinatorial approach to detecting buffer overflow vulnerabilities Autor Wenhua Wang, Yu Lei, Donggang Liu, Kung, D., Csallner, C., Dazhi Zhang, Kacker, R., Kuhn, R.

    ISBN: 9781424492329, 1424492327
    ISSN: 1530-0889
    Vydáno: IEEE 01.06.2011
    “…Buffer overflow vulnerabilities are program defects that can cause a buffer to overflow at runtime. Many security attacks exploit buffer overflow…”
    Získat plný text
    Konferenční příspěvek
  7. 7

    Buffer Overflow Vulnerability Detection Based on Static Analysis-assisted Symbolic Execution Autor Wang, Wenhui, Zhwng, PEngland, Wei, Guichen, Ge, Zhenwei, Qin, Zhongyuan, Sun, Xin

    Vydáno: IEEE 18.08.2023
    “…Buffer overflow is a common exploitable high-risk vulnerability that can lead to arbitrary code execution, thus effective detection of buffer overflow…”
    Získat plný text
    Konferenční příspěvek
  8. 8

    Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis Autor Ying, Huan, Zhang, Yanmiao, Han, Lifang, Cheng, Yushi, Li, Jiyuan, Ji, Xiaoyu, Xu, Wenyuan

    Vydáno: IEEE 01.03.2019
    “…As a modern power transmission network, smart grid connects plenty of terminal devices. However, along with the growth of devices are the security threats…”
    Získat plný text
    Konferenční příspěvek
  9. 9

    Detecting integer overflow in Windows binary executables based on symbolic execution Autor Bin Zhang, Chao Feng, Bo Wu, Chaojing Tang

    Vydáno: IEEE 01.05.2016
    “…The integer overflow vulnerabilities exist in Windows binary executables still take up a large proportion of software security vulnerabilities. As integer…”
    Získat plný text
    Konferenční příspěvek
  10. 10

    Identifying buffer overflow vulnerabilities based on binary code Autor Shunli Ding, Jingbo Yuan

    ISBN: 9781424487271, 1424487277
    Vydáno: IEEE 01.06.2011
    “…Buffer overflow attack is the most common and arguably the most dangerous attack method. The buffer overflow detecting will play a significant role in network…”
    Získat plný text
    Konferenční příspěvek
  11. 11

    Goal-oriented dynamic test generation Autor Do, TheAnh, Khoo, Siau-Cheng, Fong, Alvis Cheuk Ming, Pears, Russel, Quan, Tho Thanh

    ISSN: 0950-5849, 1873-6025
    Vydáno: Amsterdam Elsevier B.V 01.10.2015
    Vydáno v Information and software technology (01.10.2015)
    “…Memory safety errors such as buffer overflow vulnerabilities are one of the most serious classes of security threats. Detecting and removing such security…”
    Získat plný text
    Journal Article
  12. 12

    CorCA: An Automatic Program Repair Tool for Checking and Removing Effectively C Flaws Autor Inacio, Joao, Medeiros, Iberia

    Vydáno: IEEE 01.04.2023
    “…Embedded systems are present in many devices, such as the Internet of Things, drones, and cyber-physical systems. The software security of these devices can be…”
    Získat plný text
    Konferenční příspěvek
  13. 13

    Effectiveness on C Flaws Checking and Removal Autor Inacio, Joao, Medeiros, Iberia

    Vydáno: IEEE 01.06.2022
    “…The use of software daily has become inevitable nowadays. Almost all everyday tools and the most different areas (e.g., medicine or telecommunications) are…”
    Získat plný text
    Konferenční příspěvek
  14. 14

    Host‐Level Threats and Vulnerabilities Autor Belapurkar, Abhijit, Chakrabarti, Anirban, Ponnapalli, Harigopal, Varadarajan, Niranjan, Padmanabhuni, Srinivas, Sundarrajan, Srikanth

    ISBN: 0470519886, 9780470519882
    Vydáno: Chichester, UK John Wiley & Sons, Ltd 13.02.2009
    “…This chapter contains sections titled: Background Malware Eavesdropping Job Faults Resource Starvation Overflow Privilege Escalation Injection Attacks…”
    Získat plný text
    Kapitola