Search Results - "stack buffer overflow attack"
-
1
Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE
ISSN: 2832-1324Published: IEEE 27.11.2023Published in International Symposium on Computing and Networking Workshops (Online) (27.11.2023)“…TEE systems provide normal world and secure world. It is impossible to gain access to the secure world directly from the normal world. However, vulnerabilities…”
Get full text
Conference Proceeding -
2
RS-Stack: Defense against Stack Buffer Overflow Attack with Random Shadow Stack
Published: IEEE 28.10.2022Published in 2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA) (28.10.2022)“…Shadow stack is a method to prevent stack buffer overflow attack. However, in the existing shadow stack solutions, it is often supposed that the shadow stack is safe, but the reality is not always the case…”
Get full text
Conference Proceeding -
3
HardStack: Prevent Stack Buffer Overflow Attack with LBR
Published: IEEE 01.12.2019Published in 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) (01.12.2019)“…Stack buffer overflow attack can temper with software control flow by continuously injecting data into stack and overwriting function return address…”
Get full text
Conference Proceeding -
4
Nile: A Programmable Monitoring Coprocessor
ISSN: 1556-6056, 1556-6064Published: New York IEEE 01.01.2018Published in IEEE computer architecture letters (01.01.2018)“…Researchers widely employ hardware performance counters (HPCs) as well as debugging and profiling tools in processors for monitoring different events such as…”
Get full text
Journal Article -
5
Hardware-based stack buffer overflow attack detection on RISC-V architectures
ISSN: 2331-8422Published: Ithaca Cornell University Library, arXiv.org 12.06.2024Published in arXiv.org (12.06.2024)“…This work evaluates how well hardware-based approaches detect stack buffer overflow (SBO) attacks in RISC-V systems. We conducted simulations on the PULP…”
Get full text
Paper -
6
Massachusetts Inventor Develops Stack Buffer Overflow Attack Preventing Method
Published: Washington, D.C HT Digital Streams Limited 03.08.2006Published in US Fed News Service, Including US State News (03.08.2006)Get full text
Newsletter -
7
Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core
Published: IEEE 11.03.2025Published in 2025 IEEE 26th Latin American Test Symposium (LATS) (11.03.2025)“…The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such…”
Get full text
Conference Proceeding -
8
SSPFA: effective stack smashing protection for Android OS
ISSN: 1615-5262, 1615-5270Published: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2019Published in International journal of information security (01.08.2019)“…In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails…”
Get full text
Journal Article -
9
To Detect Stack Buffer Overflow with Polymorphic Canaries
ISSN: 2158-3927Published: IEEE 01.06.2018Published in Proceedings - International Conference on Dependable Systems and Networks (01.06.2018)“…Stack Smashing Protection (SSP) is a simple and highly efficient technique widely used in practice as the front line defense against stack buffer overflow attacks…”
Get full text
Conference Proceeding -
10
Design time and runtime collaborative defense to enhance embedded system security
ISBN: 9781369594737, 1369594739Published: ProQuest Dissertations & Theses 01.01.2016“…While the ever-growing utilization of embedded systems facilitates our daily life, it also makes the threat from cyber-attacks more severe. Embedded systems…”
Get full text
Dissertation -
11
Leveraging microarchitectural side channel information to efficiently enhance program control flow integrity
Published: ACM 01.10.2014Published in 2014 International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS) : October 12-17, 2014, Jaypee Greens Golf and Spa Resort, New Delhi, India (01.10.2014)“… to embedded systems. To reduce such overhead, our goal is to develop a low-cost scheme to "filter out" potential stack buffer overflow attacks…”
Get full text
Conference Proceeding -
12
Preventing Stack Buffer Overflows Through the Use of Automatic Source Code Transformation
ISBN: 9798380398176Published: ProQuest Dissertations & Theses 01.01.2004“… Moving stack allocated arrays to the heap achieves an automated solution for both current and future stack buffer overflow attacks against the original source code…”
Get full text
Dissertation

