Search Results - "exploiting buffer overflow"
-
1
Exploiting stack-based buffer overflow using modern day techniques
ISSN: 1877-0509, 1877-0509Published: Elsevier B.V 2019Published in Procedia computer science (2019)“…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow. The buffer overflow occurs when a…”
Get full text
Journal Article -
2
Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios
Published: IEEE 01.07.2018Published in 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) (01.07.2018)“…As wireless systems are becoming more complex, there is a shift towards implementing these systems completely in software and firmware rather than hardware…”
Get full text
Conference Proceeding -
3
Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation
ISSN: 1063-6692, 1558-2566Published: New York IEEE 01.02.2010Published in IEEE/ACM transactions on networking (01.02.2010)“… As the first step, we design a network-based length-based signature generator (LESG) for the worms exploiting buffer overflow vulnerabilities…”
Get full text
Journal Article -
4
Buffer overflow attacks : detect, exploit, prevent
ISBN: 9781932266672, 1932266674Published: Rockland, Mass Syngress 2005“…The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer…”
Get full text
eBook Book -
5
Buffer overflow and format string overflow vulnerabilities
ISSN: 0038-0644, 1097-024XPublished: Chichester, UK John Wiley & Sons, Ltd 25.04.2003Published in Software, practice & experience (25.04.2003)“… This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures…”
Get full text
Journal Article -
6
Exploiting buffer overflows over Bluetooth: the BluePass tool
ISBN: 0780390199, 9780780390195ISSN: 1811-3923Published: IEEE 2005Published in Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005 (2005)“…Mobile devices enable users to have ubiquitous access to resources and perform purchases, payments, authentication, storage. Furthermore, short range networks,…”
Get full text
Conference Proceeding -
7
Network-Level Length-Based Intrusion Detection System
ISSN: 0973-5151, 2230-7168Published: Nagercoil iManager Publications 01.10.2010Published in I-Manager's Journal on Software Engineering (01.10.2010)“…As the transmission of data on the Internet increases, the need to protect connected systems also increases. Most existing network-based signatures are…”
Get full text
Journal Article -
8
Router-based anomaly/intrusion detection and mitigation
ISBN: 1109527098, 9781109527094Published: ProQuest Dissertations & Theses 01.01.2009“…In this thesis, I propose and develop a network-based attack defense system, RAIDM. I focus on network based defense because of the following reasons: (i)…”
Get full text
Dissertation -
9
StackOFFence: a technique for defending against buffer overflow attacks
ISBN: 0769523153, 9780769523156Published: IEEE 2005Published in ITCC 2005 : International Conference on Information Technology: Coding and Computing : proceedings : 4-6 April, 2005, Las Vegas, Nevada (2005)“… This results in software code that is more vulnerable to security intrusions exploiting buffer overflow vulnerabilities…”
Get full text
Conference Proceeding -
10
A Performance Aware Security Framework to Avoid Software Attacks on Internet of Things (IoT) Based Patient Monitoring System
Published: IEEE 01.03.2018Published in 2018 International Conference on Current Trends Towards Converging Technologies (ICCTCT) (01.03.2018)“… The Software attacks are the major sources of security vulnerabilities networks on a system. This type of attack consist of exploiting buffer overflows which is Denial…”
Get full text
Conference Proceeding -
11
Advanced exploitation of buffer overflow
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 21.05.2004Published in arXiv.org (21.05.2004)“…This article describes in depth several ways of exploiting buffer overflows in the UNIX operating systems…”
Get full text
Paper -
12
Digagogo Ventures Bolsters Advisory Board
Published: Jacksonville Close-Up Media, Inc 04.08.2011Published in Professional Services Close - Up (04.08.2011)“…: Second Edition," published by Syngress publishing. This book details many network security methods including exploiting buffer overflows, IDS evasion and cryptography…”
Get full text
Newsletter

