Výsledky vyhledávání - Stack overflow prevention method
-
1
Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE
ISSN: 2832-1324Vydáno: IEEE 27.11.2023Vydáno v International Symposium on Computing and Networking Workshops (Online) (27.11.2023)“… We also propose a method for preventing attacks that exploit stack buffer overflows in TA command calls…”
Získat plný text
Konferenční příspěvek -
2
Exploiting stack-based buffer overflow using modern day techniques
ISSN: 1877-0509, 1877-0509Vydáno: Elsevier B.V 2019Vydáno v Procedia computer science (2019)“…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow…”
Získat plný text
Journal Article -
3
Evolution and differentiation of the cybersecurity communities in three social question and answer sites: A mixed-methods analysis
ISSN: 1932-6203, 1932-6203Vydáno: United States Public Library of Science 31.12.2021Vydáno v PloS one (31.12.2021)“… Historically, Stack Overflow has been the most popular platform for different kinds of technical questions, including for cybersecurity…”
Získat plný text
Journal Article -
4
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack
ISBN: 0769530605, 9780769530604ISSN: 1063-9527Vydáno: IEEE 01.12.2007Vydáno v Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) (01.12.2007)“…Heap and stack buffer overflows are still among the most common attack vectors in intrusion attempts…”
Získat plný text
Konferenční příspěvek -
5
Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags
ISSN: 2375-1207Vydáno: IEEE 19.05.2024Vydáno v Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)“…Spatial memory errors such as buffer overflows still rank among the top vulnerabilities in C/C++ programs…”
Získat plný text
Konferenční příspěvek -
6
Preventing Brute Force Attacks Against Stack Canary Protection on Networking Servers
Vydáno: IEEE 01.08.2013Vydáno v 2013 IEEE 12th International Symposium on Network Computing and Applications (01.08.2013)“…The buffer overflow is still an important problem despite the various protection methods developed and widely used on most systems…”
Získat plný text
Konferenční příspěvek -
7
Developing and Assessing a Web-Based Interactive Visualization Tool to Teach Buffer Overflow Concepts
ISSN: 2377-634XVydáno: IEEE 21.10.2020Vydáno v Proceedings - Frontiers in Education Conference (21.10.2020)“… More recently, advances in protection methods including non-executable stack, canaries, ASLR, and Windows DEP have made buffer overflow attacks a much smaller security concern, but they are…”
Získat plný text
Konferenční příspěvek -
8
The principle and prevention of windows buffer overflow
ISBN: 9781467302418, 1467302414Vydáno: IEEE 01.07.2012Vydáno v 2012 7th International Conference on Computer Science and Education (01.07.2012)“…This paper analyzes the basic principle of buffer overflow, and describes the basic methods of using the buffer overflow to attack the computer system…”
Získat plný text
Konferenční příspěvek -
9
Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems
ISBN: 1424458056, 9781424458059Vydáno: IEEE 01.02.2010Vydáno v 2010 Fourth International Conference on the Digital Society (01.02.2010)“…There has been a significant amount of research recently into methods of protecting systems from buffer overflow attacks by detecting stack injected shell code…”
Získat plný text
Konferenční příspěvek -
10
The Dynamic Buffer Overflow Detection and Prevent ion Tool for Yindows Executables Using Binary Rewr iting
ISBN: 9788955191318, 8955191316ISSN: 1738-9445Vydáno: IEEE 01.02.2007Vydáno v The 9th International Conference on Advanced Communication Technology (01.02.2007)“… Our tool enables dynamically detecting and preventing of stack-based buffer overflow attacks for Windows applications, using binary rewriting method…”
Získat plný text
Konferenční příspěvek -
11
Transparent runtime randomization for security
ISBN: 0769519555, 9780769519555ISSN: 1060-9857“… TRR dynamically and randomly relocates a program's stack, heap, shared libraries, and parts of its runtime control data structures inside the application memory address space…”Vydáno: IEEE 2003
Získat plný text
Konferenční příspěvek -
12
LibsafeXP: A Practical and Transparent Tool for Run-time Buffer Overflow Preventions
ISBN: 9781424401307, 1424401305Vydáno: IEEE 2006Vydáno v 2006 IEEE Information Assurance Workshop (2006)“…This paper presents a practical tool, LibsafeXP, to protect the software against the most common and severe attack, buffer overflows…”
Získat plný text
Konferenční příspěvek -
13
JITSafe: a framework against Just-in-time spraying attacks
ISSN: 1751-8709, 1751-8717Vydáno: Stevenage The Institution of Engineering and Technology 01.12.2013Vydáno v IET information security (01.12.2013)“… It can circumvent the defenses such as data execution prevention and address space layout randomisation built-in in the modern operation system, which were thought the insurmountable barrier…”
Získat plný text
Journal Article -
14
Arbitrary Copy: Bypassing Buffer-Overflow Protections
ISBN: 0780395921, 9780780395923ISSN: 2154-0357Vydáno: IEEE 01.05.2006Vydáno v 2006 IEEE International Conference on Electro/Information Technology (01.05.2006)“… stack smashing, jump table). In this paper, we introduce arbitrary copy, a type of buffer-overflow attack that is capable of bypassing most buffer-overflow solutions…”
Získat plný text
Konferenční příspěvek -
15
The cost of preventing a buffer overflow
Vydáno: IEEE 01.04.2014Vydáno v Proceedings of the 2014 Zone 1 Conference of the American Society for Engineering Education (01.04.2014)“…In the paper we have considered the main methods of buffer overflows, mitigation strategies, and their influence on the memory consumption…”
Získat plný text
Konferenční příspěvek -
16
SeBROP: blind ROP attacks without returns
ISSN: 2095-2228, 2095-2236Vydáno: Beijing Higher Education Press 01.08.2022Vydáno v Frontiers of Computer Science (01.08.2022)“…) to address these challenges. Our SeBROP can initiate a successful exploit to server-side programs using only a stack overflow vulnerability…”
Získat plný text
Journal Article -
17
PRODUCT SPOTLIGHT: Dust Control & Explosion Prevention
ISSN: 1055-3223, 2160-3189Vydáno: Rockford Watt Global Media 01.01.2022Vydáno v Feed & grain (01.01.2022)“… * Baghouse filter with patented method for controlling and activating reverse air cleaning system…”
Získat plný text
Magazine Article -
18
Software defect severity estimation in presence of modern defense mechanisms
ISSN: 2079-8156, 2220-6426Vydáno: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018Vydáno v Trudy Instituta sistemnogo programmirovaniâ (01.10.2018)“…This paper introduces a refined method for automated exploitability evaluation of found program bugs…”
Získat plný text
Journal Article

