Search Results - "buffer-overflow vulnerability detection"
-
1
BovdGFE: buffer overflow vulnerability detection based on graph feature extraction
ISSN: 0924-669X, 1573-7497Published: New York Springer US 01.06.2023Published in Applied intelligence (Dordrecht, Netherlands) (01.06.2023)“… To resolve the existing problems, we propose a method for buffer overflow vulnerability detection based on graph feature extraction (BovdGFE) in C/C++ programs…”
Get full text
Journal Article -
2
Buffer Overflow Vulnerability Detection Based on Unsafe Function Invocation
ISSN: 1742-6588, 1742-6596Published: Bristol IOP Publishing 01.06.2020Published in Journal of physics. Conference series (01.06.2020)“… In order to effectively mitigate buffer vulnerabilities, we proposed a buffer overflow vulnerability detection technique based on unsafe function invocation…”
Get full text
Journal Article -
3
BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis
ISSN: 1939-0114, 1939-0122Published: London Hindawi 22.06.2022Published in Security and communication networks (22.06.2022)“…Stack buffer overflow vulnerability is a common software vulnerability that can overwrite function return addresses and hijack program control flow, causing…”
Get full text
Journal Article -
4
Binary Static Analysis-based Buffer Overflow Vulnerability Detection Technique using Function Prologue and Epilogue
ISSN: 2383-6318, 2383-6326Published: 31.10.2024Published in KIISE Transactions on Computing Practices (31.10.2024)Get full text
Journal Article -
5
Buffer Overflow Vulnerability Detection Based on Static Analysis-assisted Symbolic Execution
Published: IEEE 18.08.2023Published in 2023 4th International Symposium on Computer Engineering and Intelligent Communications (ISCEIC) (18.08.2023)“…Buffer overflow is a common exploitable high-risk vulnerability that can lead to arbitrary code execution, thus effective detection of buffer overflow…”
Get full text
Conference Proceeding -
6
Smart fuzzing method for detecting stack-based buffer overflow in binary codes
ISSN: 1751-8806, 1751-8814, 1751-8814Published: The Institution of Engineering and Technology 01.08.2016Published in IET software (01.08.2016)“…During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the…”
Get full text
Journal Article -
7
Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
Published: IEEE 01.03.2019Published in 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) (01.03.2019)“…As a modern power transmission network, smart grid connects plenty of terminal devices. However, along with the growth of devices are the security threats…”
Get full text
Conference Proceeding -
8
BOFSanitizer: Efficient locator and detector for buffer overflow vulnerability
“… This paper presents a BOF-Sanitizer method for buffer overflow vulnerability detection. We proposed a pre-process method that combine vulnerability metric and rank…”Published: IEEE 01.12.2021
Get full text
Conference Proceeding -
9
Vulnerability Detection Algorithm of Lightweight Linux Internet of Things Application with Symbolic Execution Method
Published: IEEE 01.06.2021Published in 2021 International Symposium on Computer Technology and Information Science (ISCTIS) (01.06.2021)“…The security of Internet of Things (IoT) devices has become a matter of great concern in recent years. The existence of security holes in the executable…”
Get full text
Conference Proceeding -
10
Automatic Detection of Stack Overflow Attack in Canary
Published: IEEE 01.07.2018Published in 2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC) (01.07.2018)“…The existing buffer overflow vulnerability detection technology checks the control flow state of the program to determine the trigger point of the program and generate test cases…”
Get full text
Conference Proceeding -
11
A Novel Method of Software Vulnerability Detection based on Fuzzing Technique
ISBN: 1424434270, 9781424434251, 1424434254, 9781424434275Published: IEEE 01.12.2008Published in 2008 International Conference on Apperceiving Computing and Intelligence Analysis (01.12.2008)“… However the techniques of buffer overflow vulnerability detection are limited to manual analysis, binary-patch comparison, fuzzing and so on…”
Get full text
Conference Proceeding -
12
함수 프롤로그 및 에필로그를 이용한 바이너리 정적 분석 기반 버퍼 오버플로우 취약점 탐지 기법
ISSN: 2383-6318, 2383-6326Published: Korean Institute of Information Scientists and Engineers 01.10.2024Published in 정보과학회 컴퓨팅의 실제 논문지 (01.10.2024)“…버퍼 오버플로우 취약점은 프로그램이 버퍼에 할당한 메모리보다 더 많은 데이터를 쓸 때 발생하는 취약점으로 가장 많이 발생하는 취약점 중 하나이다. 정적 분석을…”
Get full text
Journal Article -
13
A method for detecting buffer overflow vulnerabilities
ISBN: 9781612844855, 1612844855Published: IEEE 01.05.2011Published in 2011 IEEE 3rd International Conference on Communication Software and Networks (01.05.2011)“… The paper presents a method that combines static analysis with dynamic test to deal with the problem on buffer overflow vulnerabilities detecting…”
Get full text
Conference Proceeding

