Výsledky vyhledávání - Buffer overflow vulnerabilities
-
1
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
ISSN: 1545-5971, 1941-0018Vydáno: Washington IEEE 01.11.2013Vydáno v IEEE transactions on dependable and secure computing (01.11.2013)“… This paper presents SafeStack, a system that can automatically diagnose and patch stack-based buffer overflow vulnerabilities…”
Získat plný text
Journal Article -
2
Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis
ISSN: 1751-8806, 1751-8814, 1751-8814Vydáno: The Institution of Engineering and Technology 01.04.2016Vydáno v IET software (01.04.2016)“…Buffer overflow (BOF) vulnerabilities when present in code can be exploited to violate security objectives such as availability, confidentiality and integrity…”
Získat plný text
Journal Article -
3
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
ISSN: 2523-3246, 2523-3246Vydáno: Singapore Springer Singapore 08.09.2020Vydáno v Cybersecurity (Singapore) (08.09.2020)“…The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems…”
Získat plný text
Journal Article -
4
Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 2021Vydáno v IEEE access (2021)“… Issues with memory management, in particular buffer overflow, are among the most frequently exploited vulnerabilities in software systems developed in C/C++…”
Získat plný text
Journal Article -
5
BovdGFE: buffer overflow vulnerability detection based on graph feature extraction
ISSN: 0924-669X, 1573-7497Vydáno: New York Springer US 01.06.2023Vydáno v Applied intelligence (Dordrecht, Netherlands) (01.06.2023)“…Automatically detecting buffer overflow vulnerabilities is an important research topic in software security…”
Získat plný text
Journal Article -
6
Defending against Buffer-Overflow Vulnerabilities
ISSN: 0018-9162, 1558-0814Vydáno: New York, NY IEEE 01.11.2011Vydáno v Computer (Long Beach, Calif.) (01.11.2011)“…A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow…”
Získat plný text
Journal Article -
7
Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
ISSN: 1999-5903, 1999-5903Vydáno: Basel MDPI AG 01.05.2023Vydáno v Future internet (01.05.2023)“… However, mining buffer overflow (BOF) vulnerabilities in ADASs can be challenging since their code and data are not publicly available…”
Získat plný text
Journal Article -
8
A multitype software buffer overflow vulnerability prediction method based on a software graph structure and a self-attentive graph neural network
ISSN: 0950-5849, 1873-6025Vydáno: Elsevier B.V 01.08.2023Vydáno v Information and software technology (01.08.2023)“…•A method for predicting buffer overflow vulnerabilities in multiple types of software is proposed…”
Získat plný text
Journal Article -
9
Buffer Overflow Vulnerability Detection Based on Unsafe Function Invocation
ISSN: 1742-6588, 1742-6596Vydáno: Bristol IOP Publishing 01.06.2020Vydáno v Journal of physics. Conference series (01.06.2020)“…Buffer overflow vulnerabilities are widespread in software programs and pose a serious security threat…”
Získat plný text
Journal Article -
10
Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning
ISSN: 1024-123X, 1563-5147Vydáno: Cairo, Egypt Hindawi Publishing Corporation 01.01.2017Vydáno v Mathematical problems in engineering (01.01.2017)“…Buffer overflow vulnerability is a kind of consequence in which programmers’ intentions are not implemented correctly…”
Získat plný text
Journal Article -
11
Techniques for Defending from Buffer Overflow Vulnerability Security Exploits
ISSN: 1089-7801, 1941-0131Vydáno: IEEE 2019Vydáno v IEEE internet computing (2019)“… Buffer overflow vulnerability is the most severe of security violations. Though wide range of solutions from static analysis techniques to hardware modifications…”
Získat plný text
Journal Article -
12
Buffer overflow vulnerabilities in CUDA: a preliminary analysis
ISSN: 2263-8733, 2263-8733Vydáno: Paris Springer Paris 01.05.2016Vydáno v Journal of computer virology and hacking techniques (01.05.2016)“…We present a preliminary study of buffer overflow vulnerabilities in CUDA software running on GPUs…”
Získat plný text
Journal Article -
13
BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis
ISSN: 1939-0114, 1939-0122Vydáno: London Hindawi 22.06.2022Vydáno v Security and communication networks (22.06.2022)“…Stack buffer overflow vulnerability is a common software vulnerability that can overwrite function return addresses and hijack program control flow, causing serious system problems…”
Získat plný text
Journal Article -
14
Automatic Repair Method for D2D Communication Routing Buffer Overflow Vulnerability in Cellular Network
ISSN: 1058-9244, 1875-919XVydáno: New York Hindawi 20.12.2021Vydáno v Scientific programming (20.12.2021)“…Repairing D2D communication routing buffer overflow in a cellular network is of great significance in improving communication quality and security…”
Získat plný text
Journal Article -
15
Automated exploit generation for stack buffer overflow vulnerabilities
ISSN: 0361-7688, 1608-3261Vydáno: Moscow Pleiades Publishing 01.11.2015Vydáno v Programming and computer software (01.11.2015)“…An automated method for exploit generation is presented. This method allows one to construct exploits for stack buffer overflow vulnerabilities and to prioritize software bugs…”
Získat plný text
Journal Article -
16
Automated exploit generation method for stack buffer overflow vulnerabilities
ISSN: 2079-8156, 2220-6426Vydáno: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018Vydáno v Trudy Instituta sistemnogo programmirovaniâ (01.10.2018)“…In this paper automated method for exploit generation is presented. This method allows to construct exploits for stack buffer overflow vulnerabilities and also to prioritize software bugs…”
Získat plný text
Journal Article -
17
A combinatorial approach to detecting buffer overflow vulnerabilities
ISBN: 9781424492329, 1424492327ISSN: 1530-0889Vydáno: IEEE 01.06.2011Vydáno v 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN) (01.06.2011)“…Buffer overflow vulnerabilities are program defects that can cause a buffer to overflow at runtime…”
Získat plný text
Konferenční příspěvek -
18
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities
ISBN: 0780382307, 9780780382305ISSN: 1542-1201“… In this paper, we propose a simple solution called "Buttercup" to counter against attacks based on buffer-overflow exploits…”Vydáno: Piscataway NJ IEEE 2004
Získat plný text
Konferenční příspěvek -
19
Buffer Overflow Vulnerabilities and Prevention
ISSN: 2582-3930, 2582-3930Vydáno: 26.06.2022Vydáno v INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT (26.06.2022)“…Either in terms of software error or being an attack itself, buffer overflow attacks have been one of the most important security problems accountable for a common vulnerability of software security and cyber risks…”
Získat plný text
Journal Article -
20
Automatic Exploit Generation for Buffer Overflow Vulnerabilities
Vydáno: IEEE 01.07.2018Vydáno v 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS C) (01.07.2018)“…Buffer overflow vulnerabilities are widely found in software. Finding these vulnerabilities and identifying whether these vulnerabilities can be exploit is very important…”
Získat plný text
Konferenční příspěvek

