Search Results - "buffer-overflow vulnerability detection"

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    BovdGFE: buffer overflow vulnerability detection based on graph feature extraction by Lv, Xinghang, Peng, Tao, Chen, Jia, Liu, Junping, Hu, Xinrong, He, Ruhan, Jiang, Minghua, Cao, Wenli

    ISSN: 0924-669X, 1573-7497
    Published: New York Springer US 01.06.2023
    “… To resolve the existing problems, we propose a method for buffer overflow vulnerability detection based on graph feature extraction (BovdGFE) in C/C++ programs…”
    Get full text
    Journal Article
  2. 2

    Buffer Overflow Vulnerability Detection Based on Unsafe Function Invocation by Zhao, Xianda, Huang, Shuguang, Pan, Zulie, Hui, Huang

    ISSN: 1742-6588, 1742-6596
    Published: Bristol IOP Publishing 01.06.2020
    Published in Journal of physics. Conference series (01.06.2020)
    “… In order to effectively mitigate buffer vulnerabilities, we proposed a buffer overflow vulnerability detection technique based on unsafe function invocation…”
    Get full text
    Journal Article
  3. 3

    BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis by Xu, Shenglin, Wang, Yongjun

    ISSN: 1939-0114, 1939-0122
    Published: London Hindawi 22.06.2022
    Published in Security and communication networks (22.06.2022)
    “…Stack buffer overflow vulnerability is a common software vulnerability that can overwrite function return addresses and hijack program control flow, causing…”
    Get full text
    Journal Article
  4. 4
  5. 5

    Buffer Overflow Vulnerability Detection Based on Static Analysis-assisted Symbolic Execution by Wang, Wenhui, Zhwng, PEngland, Wei, Guichen, Ge, Zhenwei, Qin, Zhongyuan, Sun, Xin

    Published: IEEE 18.08.2023
    “…Buffer overflow is a common exploitable high-risk vulnerability that can lead to arbitrary code execution, thus effective detection of buffer overflow…”
    Get full text
    Conference Proceeding
  6. 6

    Smart fuzzing method for detecting stack-based buffer overflow in binary codes by Mouzarani, Maryam, Sadeghiyan, Babak, Zolfaghari, Mohammad

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Published: The Institution of Engineering and Technology 01.08.2016
    Published in IET software (01.08.2016)
    “…During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the…”
    Get full text
    Journal Article
  7. 7

    Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis by Ying, Huan, Zhang, Yanmiao, Han, Lifang, Cheng, Yushi, Li, Jiyuan, Ji, Xiaoyu, Xu, Wenyuan

    Published: IEEE 01.03.2019
    “…As a modern power transmission network, smart grid connects plenty of terminal devices. However, along with the growth of devices are the security threats…”
    Get full text
    Conference Proceeding
  8. 8
  9. 9

    Vulnerability Detection Algorithm of Lightweight Linux Internet of Things Application with Symbolic Execution Method by Li, Hongrui, Zhou, Lili, Xing, Mingming, Taha, Hafsah binti

    Published: IEEE 01.06.2021
    “…The security of Internet of Things (IoT) devices has become a matter of great concern in recent years. The existence of security holes in the executable…”
    Get full text
    Conference Proceeding
  10. 10

    Automatic Detection of Stack Overflow Attack in Canary by Huang, Ning, Huang, Shuguang, Deng, Zhaokun

    Published: IEEE 01.07.2018
    “…The existing buffer overflow vulnerability detection technology checks the control flow state of the program to determine the trigger point of the program and generate test cases…”
    Get full text
    Conference Proceeding
  11. 11

    A Novel Method of Software Vulnerability Detection based on Fuzzing Technique by Xiao-Song Zhang, Lin Shao, Jiong Zheng

    ISBN: 1424434270, 9781424434251, 1424434254, 9781424434275
    Published: IEEE 01.12.2008
    “… However the techniques of buffer overflow vulnerability detection are limited to manual analysis, binary-patch comparison, fuzzing and so on…”
    Get full text
    Conference Proceeding
  12. 12

    함수 프롤로그 및 에필로그를 이용한 바이너리 정적 분석 기반 버퍼 오버플로우 취약점 탐지 기법 by 김동수(Dongsoo Kim), 김태호(Taiho Kim), 김상엽(Sangyub Kim), 신영주(Youngjoo Shin)

    ISSN: 2383-6318, 2383-6326
    Published: Korean Institute of Information Scientists and Engineers 01.10.2024
    “…버퍼 오버플로우 취약점은 프로그램이 버퍼에 할당한 메모리보다 더 많은 데이터를 쓸 때 발생하는 취약점으로 가장 많이 발생하는 취약점 중 하나이다. 정적 분석을…”
    Get full text
    Journal Article
  13. 13

    A method for detecting buffer overflow vulnerabilities by Jingbo Yuan, Shunli Ding

    ISBN: 9781612844855, 1612844855
    Published: IEEE 01.05.2011
    “… The paper presents a method that combines static analysis with dynamic test to deal with the problem on buffer overflow vulnerabilities detecting…”
    Get full text
    Conference Proceeding