Výsledky vyhledávání - (("exploiting buffer overflow") OR ("exploring buffer overflow"))

  • Zobrazuji výsledky 1 - 12 z 12
Upřesnit hledání
  1. 1

    Exploiting stack-based buffer overflow using modern day techniques Autor Nicula, Ștefan, Zota, Răzvan Daniel

    ISSN: 1877-0509, 1877-0509
    Vydáno: Elsevier B.V 2019
    Vydáno v Procedia computer science (2019)
    “…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow. The buffer overflow occurs when a…”
    Získat plný text
    Journal Article
  2. 2

    Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios Autor Hitefield, S. D., Fowler, M., Clancy, T. Charles

    Vydáno: IEEE 01.07.2018
    “…As wireless systems are becoming more complex, there is a shift towards implementing these systems completely in software and firmware rather than hardware…”
    Získat plný text
    Konferenční příspěvek
  3. 3

    Buffer overflow attacks : detect, exploit, prevent Autor Foster, James C.

    ISBN: 9781932266672, 1932266674
    Vydáno: Rockland, Mass Syngress 2005
    “…The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer…”
    Získat plný text
    E-kniha Kniha
  4. 4

    Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation Autor Wang, Lanjia, Li, Zhichun, Chen, Yan, Fu, Zhi (Judy), Li, Xing

    ISSN: 1063-6692, 1558-2566
    Vydáno: New York IEEE 01.02.2010
    Vydáno v IEEE/ACM transactions on networking (01.02.2010)
    “… As the first step, we design a network-based length-based signature generator (LESG) for the worms exploiting buffer overflow vulnerabilities…”
    Získat plný text
    Journal Article
  5. 5

    Buffer overflow and format string overflow vulnerabilities Autor Lhee, Kyung-Suk, Chapin, Steve J.

    ISSN: 0038-0644, 1097-024X
    Vydáno: Chichester, UK John Wiley & Sons, Ltd 25.04.2003
    Vydáno v Software, practice & experience (25.04.2003)
    “… This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures…”
    Získat plný text
    Journal Article
  6. 6

    Exploiting buffer overflows over Bluetooth: the BluePass tool Autor Gianluigi Me

    ISBN: 0780390199, 9780780390195
    ISSN: 1811-3923
    Vydáno: IEEE 2005
    “…Mobile devices enable users to have ubiquitous access to resources and perform purchases, payments, authentication, storage. Furthermore, short range networks,…”
    Získat plný text
    Konferenční příspěvek
  7. 7

    Network-Level Length-Based Intrusion Detection System Autor Jeya, S., Pillai, S. Muthu Perumal

    ISSN: 0973-5151, 2230-7168
    Vydáno: Nagercoil iManager Publications 01.10.2010
    “…As the transmission of data on the Internet increases, the need to protect connected systems also increases. Most existing network-based signatures are…”
    Získat plný text
    Journal Article
  8. 8

    Router-based anomaly/intrusion detection and mitigation Autor Li, Zhichun

    ISBN: 1109527098, 9781109527094
    Vydáno: ProQuest Dissertations & Theses 01.01.2009
    “…In this thesis, I propose and develop a network-based attack defense system, RAIDM. I focus on network based defense because of the following reasons: (i)…”
    Získat plný text
    Dissertation
  9. 9

    StackOFFence: a technique for defending against buffer overflow attacks Autor Madan, B.B., Phoha, S., Trivedi, K.S.

    ISBN: 0769523153, 9780769523156
    Vydáno: IEEE 2005
    “… This results in software code that is more vulnerable to security intrusions exploiting buffer overflow vulnerabilities…”
    Získat plný text
    Konferenční příspěvek
  10. 10

    A Performance Aware Security Framework to Avoid Software Attacks on Internet of Things (IoT) Based Patient Monitoring System Autor Abinaya, E, Aishwarva, K, Lordwin, Cecil Prabhaker. M, Kamatchi, G, Malarvizhi, I

    Vydáno: IEEE 01.03.2018
    “… The Software attacks are the major sources of security vulnerabilities networks on a system. This type of attack consist of exploiting buffer overflows which is Denial…”
    Získat plný text
    Konferenční příspěvek
  11. 11

    Advanced exploitation of buffer overflow Autor Gay, Olivier

    ISSN: 2331-8422
    Vydáno: Ithaca Cornell University Library, arXiv.org 21.05.2004
    Vydáno v arXiv.org (21.05.2004)
    “…This article describes in depth several ways of exploiting buffer overflows in the UNIX operating systems…”
    Získat plný text
    Paper
  12. 12

    Digagogo Ventures Bolsters Advisory Board

    Vydáno: Jacksonville Close-Up Media, Inc 04.08.2011
    Vydáno v Professional Services Close - Up (04.08.2011)
    “…: Second Edition," published by Syngress publishing. This book details many network security methods including exploiting buffer overflows, IDS evasion and cryptography…”
    Získat plný text
    Newsletter