Search Results - "exploiting buffer overflow"

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Exploiting stack-based buffer overflow using modern day techniques by Nicula, Ștefan, Zota, Răzvan Daniel

    ISSN: 1877-0509, 1877-0509
    Published: Elsevier B.V 2019
    Published in Procedia computer science (2019)
    “…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow. The buffer overflow occurs when a…”
    Get full text
    Journal Article
  2. 2

    Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios by Hitefield, S. D., Fowler, M., Clancy, T. Charles

    Published: IEEE 01.07.2018
    “…As wireless systems are becoming more complex, there is a shift towards implementing these systems completely in software and firmware rather than hardware…”
    Get full text
    Conference Proceeding
  3. 3

    Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation by Wang, Lanjia, Li, Zhichun, Chen, Yan, Fu, Zhi (Judy), Li, Xing

    ISSN: 1063-6692, 1558-2566
    Published: New York IEEE 01.02.2010
    Published in IEEE/ACM transactions on networking (01.02.2010)
    “… As the first step, we design a network-based length-based signature generator (LESG) for the worms exploiting buffer overflow vulnerabilities…”
    Get full text
    Journal Article
  4. 4

    Buffer overflow attacks : detect, exploit, prevent by Foster, James C.

    ISBN: 9781932266672, 1932266674
    Published: Rockland, Mass Syngress 2005
    “…The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer…”
    Get full text
    eBook Book
  5. 5

    Buffer overflow and format string overflow vulnerabilities by Lhee, Kyung-Suk, Chapin, Steve J.

    ISSN: 0038-0644, 1097-024X
    Published: Chichester, UK John Wiley & Sons, Ltd 25.04.2003
    Published in Software, practice & experience (25.04.2003)
    “… This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures…”
    Get full text
    Journal Article
  6. 6

    Exploiting buffer overflows over Bluetooth: the BluePass tool by Gianluigi Me

    ISBN: 0780390199, 9780780390195
    ISSN: 1811-3923
    Published: IEEE 2005
    “…Mobile devices enable users to have ubiquitous access to resources and perform purchases, payments, authentication, storage. Furthermore, short range networks,…”
    Get full text
    Conference Proceeding
  7. 7

    Network-Level Length-Based Intrusion Detection System by Jeya, S., Pillai, S. Muthu Perumal

    ISSN: 0973-5151, 2230-7168
    Published: Nagercoil iManager Publications 01.10.2010
    “…As the transmission of data on the Internet increases, the need to protect connected systems also increases. Most existing network-based signatures are…”
    Get full text
    Journal Article
  8. 8

    Router-based anomaly/intrusion detection and mitigation by Li, Zhichun

    ISBN: 1109527098, 9781109527094
    Published: ProQuest Dissertations & Theses 01.01.2009
    “…In this thesis, I propose and develop a network-based attack defense system, RAIDM. I focus on network based defense because of the following reasons: (i)…”
    Get full text
    Dissertation
  9. 9

    StackOFFence: a technique for defending against buffer overflow attacks by Madan, B.B., Phoha, S., Trivedi, K.S.

    ISBN: 0769523153, 9780769523156
    Published: IEEE 2005
    “… This results in software code that is more vulnerable to security intrusions exploiting buffer overflow vulnerabilities…”
    Get full text
    Conference Proceeding
  10. 10

    A Performance Aware Security Framework to Avoid Software Attacks on Internet of Things (IoT) Based Patient Monitoring System by Abinaya, E, Aishwarva, K, Lordwin, Cecil Prabhaker. M, Kamatchi, G, Malarvizhi, I

    Published: IEEE 01.03.2018
    “… The Software attacks are the major sources of security vulnerabilities networks on a system. This type of attack consist of exploiting buffer overflows which is Denial…”
    Get full text
    Conference Proceeding
  11. 11

    Advanced exploitation of buffer overflow by Gay, Olivier

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 21.05.2004
    Published in arXiv.org (21.05.2004)
    “…This article describes in depth several ways of exploiting buffer overflows in the UNIX operating systems…”
    Get full text
    Paper
  12. 12

    Digagogo Ventures Bolsters Advisory Board

    Published: Jacksonville Close-Up Media, Inc 04.08.2011
    Published in Professional Services Close - Up (04.08.2011)
    “…: Second Edition," published by Syngress publishing. This book details many network security methods including exploiting buffer overflows, IDS evasion and cryptography…”
    Get full text
    Newsletter