Search Results - "stack buffer overflow attack"

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE by Shiba, Kaito, Kuzuno, Hiroki, Yamauchi, Toshihiro

    ISSN: 2832-1324
    Published: IEEE 27.11.2023
    “…TEE systems provide normal world and secure world. It is impossible to gain access to the secure world directly from the normal world. However, vulnerabilities…”
    Get full text
    Conference Proceeding
  2. 2

    RS-Stack: Defense against Stack Buffer Overflow Attack with Random Shadow Stack by Hongwei, Zhou, Zhipeng, Ke, Yuchen, Zhang, Ruichao, Guo, Shengsheng, Li, Jinhui, Yuan

    Published: IEEE 28.10.2022
    “…Shadow stack is a method to prevent stack buffer overflow attack. However, in the existing shadow stack solutions, it is often supposed that the shadow stack is safe, but the reality is not always the case…”
    Get full text
    Conference Proceeding
  3. 3

    HardStack: Prevent Stack Buffer Overflow Attack with LBR by Zhou, Hongwei, Kang, Keda, Yuan, Jinhui

    Published: IEEE 01.12.2019
    “…Stack buffer overflow attack can temper with software control flow by continuously injecting data into stack and overwriting function return address…”
    Get full text
    Conference Proceeding
  4. 4

    Nile: A Programmable Monitoring Coprocessor by Delshadtehrani, Leila, Eldridge, Schuyler, Canakci, Sadullah, Egele, Manuel, Joshi, Ajay

    ISSN: 1556-6056, 1556-6064
    Published: New York IEEE 01.01.2018
    Published in IEEE computer architecture letters (01.01.2018)
    “…Researchers widely employ hardware performance counters (HPCs) as well as debugging and profiling tools in processors for monitoring different events such as…”
    Get full text
    Journal Article
  5. 5

    Hardware-based stack buffer overflow attack detection on RISC-V architectures by Cristiano Pegoraro Chenet, Zhang, Ziteng, Savino, Alessandro, Stefano Di Carlo

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 12.06.2024
    Published in arXiv.org (12.06.2024)
    “…This work evaluates how well hardware-based approaches detect stack buffer overflow (SBO) attacks in RISC-V systems. We conducted simulations on the PULP…”
    Get full text
    Paper
  6. 6

    Massachusetts Inventor Develops Stack Buffer Overflow Attack Preventing Method

    Published: Washington, D.C HT Digital Streams Limited 03.08.2006
    Get full text
    Newsletter
  7. 7

    Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core by Chenet, Cristiano Pegoraro, Savino, Alessandro, Di Carlo, Stefano

    Published: IEEE 11.03.2025
    “…The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such…”
    Get full text
    Conference Proceeding
  8. 8

    SSPFA: effective stack smashing protection for Android OS by Marco-Gisbert, Héctor, Ripoll-Ripoll, Ismael

    ISSN: 1615-5262, 1615-5270
    Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2019
    “…In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails…”
    Get full text
    Journal Article
  9. 9

    To Detect Stack Buffer Overflow with Polymorphic Canaries by Wang, Zhilong, Ding, Xuhua, Pang, Chengbin, Guo, Jian, Zhu, Jun, Mao, Bing

    ISSN: 2158-3927
    Published: IEEE 01.06.2018
    “…Stack Smashing Protection (SSP) is a simple and highly efficient technique widely used in practice as the front line defense against stack buffer overflow attacks…”
    Get full text
    Conference Proceeding
  10. 10

    Design time and runtime collaborative defense to enhance embedded system security by Liu, Chen

    ISBN: 9781369594737, 1369594739
    Published: ProQuest Dissertations & Theses 01.01.2016
    “…While the ever-growing utilization of embedded systems facilitates our daily life, it also makes the threat from cyber-attacks more severe. Embedded systems…”
    Get full text
    Dissertation
  11. 11

    Leveraging microarchitectural side channel information to efficiently enhance program control flow integrity by Chen Liu, Chengmo Yang, Yuanqi Shen

    Published: ACM 01.10.2014
    “… to embedded systems. To reduce such overhead, our goal is to develop a low-cost scheme to "filter out" potential stack buffer overflow attacks…”
    Get full text
    Conference Proceeding
  12. 12

    Preventing Stack Buffer Overflows Through the Use of Automatic Source Code Transformation by Dahn, Christopher S

    ISBN: 9798380398176
    Published: ProQuest Dissertations & Theses 01.01.2004
    “… Moving stack allocated arrays to the heap achieves an automated solution for both current and future stack buffer overflow attacks against the original source code…”
    Get full text
    Dissertation