Výsledky vyhledávání - (("exploiting buffer overflow") OR ("exploring buffer overflow"))
-
1
Exploiting stack-based buffer overflow using modern day techniques
ISSN: 1877-0509, 1877-0509Vydáno: Elsevier B.V 2019Vydáno v Procedia computer science (2019)“…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow. The buffer overflow occurs when a…”
Získat plný text
Journal Article -
2
Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios
“…As wireless systems are becoming more complex, there is a shift towards implementing these systems completely in software and firmware rather than hardware…”Vydáno: IEEE 01.07.2018
Získat plný text
Konferenční příspěvek -
3
Buffer overflow attacks : detect, exploit, prevent
ISBN: 9781932266672, 1932266674Vydáno: Rockland, Mass Syngress 2005“…The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer…”
Získat plný text
E-kniha Kniha -
4
Thwarting Zero-Day Polymorphic Worms With Network-Level Length-Based Signature Generation
ISSN: 1063-6692, 1558-2566Vydáno: New York IEEE 01.02.2010Vydáno v IEEE/ACM transactions on networking (01.02.2010)“… As the first step, we design a network-based length-based signature generator (LESG) for the worms exploiting buffer overflow vulnerabilities…”
Získat plný text
Journal Article -
5
Buffer overflow and format string overflow vulnerabilities
ISSN: 0038-0644, 1097-024XVydáno: Chichester, UK John Wiley & Sons, Ltd 25.04.2003Vydáno v Software, practice & experience (25.04.2003)“… This article surveys representative techniques of exploiting buffer overflow and format string overflow vulnerabilities and their currently available defensive measures…”
Získat plný text
Journal Article -
6
Exploiting buffer overflows over Bluetooth: the BluePass tool
ISBN: 0780390199, 9780780390195ISSN: 1811-3923Vydáno: IEEE 2005Vydáno v Second IFIP International Conference on Wireless and Optical Communications Networks, 2005. WOCN 2005 (2005)“…Mobile devices enable users to have ubiquitous access to resources and perform purchases, payments, authentication, storage. Furthermore, short range networks,…”
Získat plný text
Konferenční příspěvek -
7
Network-Level Length-Based Intrusion Detection System
ISSN: 0973-5151, 2230-7168Vydáno: Nagercoil iManager Publications 01.10.2010Vydáno v I-Manager's Journal on Software Engineering (01.10.2010)“…As the transmission of data on the Internet increases, the need to protect connected systems also increases. Most existing network-based signatures are…”
Získat plný text
Journal Article -
8
Router-based anomaly/intrusion detection and mitigation
ISBN: 1109527098, 9781109527094Vydáno: ProQuest Dissertations & Theses 01.01.2009“…In this thesis, I propose and develop a network-based attack defense system, RAIDM. I focus on network based defense because of the following reasons: (i)…”
Získat plný text
Dissertation -
9
StackOFFence: a technique for defending against buffer overflow attacks
ISBN: 0769523153, 9780769523156Vydáno: IEEE 2005Vydáno v ITCC 2005 : International Conference on Information Technology: Coding and Computing : proceedings : 4-6 April, 2005, Las Vegas, Nevada (2005)“… This results in software code that is more vulnerable to security intrusions exploiting buffer overflow vulnerabilities…”
Získat plný text
Konferenční příspěvek -
10
A Performance Aware Security Framework to Avoid Software Attacks on Internet of Things (IoT) Based Patient Monitoring System
Vydáno: IEEE 01.03.2018Vydáno v 2018 International Conference on Current Trends Towards Converging Technologies (ICCTCT) (01.03.2018)“… The Software attacks are the major sources of security vulnerabilities networks on a system. This type of attack consist of exploiting buffer overflows which is Denial…”
Získat plný text
Konferenční příspěvek -
11
Advanced exploitation of buffer overflow
ISSN: 2331-8422Vydáno: Ithaca Cornell University Library, arXiv.org 21.05.2004Vydáno v arXiv.org (21.05.2004)“…This article describes in depth several ways of exploiting buffer overflows in the UNIX operating systems…”
Získat plný text
Paper -
12
Digagogo Ventures Bolsters Advisory Board
Vydáno: Jacksonville Close-Up Media, Inc 04.08.2011Vydáno v Professional Services Close - Up (04.08.2011)“…: Second Edition," published by Syngress publishing. This book details many network security methods including exploiting buffer overflows, IDS evasion and cryptography…”
Získat plný text
Newsletter

