Výsledky vyhledávání - Stack overflow prevention method

  • Zobrazuji výsledky 1 - 18 z 18
Upřesnit hledání
  1. 1

    Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE Autor Shiba, Kaito, Kuzuno, Hiroki, Yamauchi, Toshihiro

    ISSN: 2832-1324
    Vydáno: IEEE 27.11.2023
    “… We also propose a method for preventing attacks that exploit stack buffer overflows in TA command calls…”
    Získat plný text
    Konferenční příspěvek
  2. 2

    Exploiting stack-based buffer overflow using modern day techniques Autor Nicula, Ștefan, Zota, Răzvan Daniel

    ISSN: 1877-0509, 1877-0509
    Vydáno: Elsevier B.V 2019
    Vydáno v Procedia computer science (2019)
    “…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow…”
    Získat plný text
    Journal Article
  3. 3

    Evolution and differentiation of the cybersecurity communities in three social question and answer sites: A mixed-methods analysis Autor Wu, Muting, Aranovich, Raul, Filkov, Vladimir

    ISSN: 1932-6203, 1932-6203
    Vydáno: United States Public Library of Science 31.12.2021
    Vydáno v PloS one (31.12.2021)
    “… Historically, Stack Overflow has been the most popular platform for different kinds of technical questions, including for cybersecurity…”
    Získat plný text
    Journal Article
  4. 4

    The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack Autor Slowinska, A., Bos, H.

    ISBN: 0769530605, 9780769530604
    ISSN: 1063-9527
    Vydáno: IEEE 01.12.2007
    “…Heap and stack buffer overflows are still among the most common attack vectors in intrusion attempts…”
    Získat plný text
    Konferenční příspěvek
  5. 5

    Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags Autor Gorter, Floris, Kroes, Taddeus, Bos, Herbert, Giuffrida, Cristiano

    ISSN: 2375-1207
    Vydáno: IEEE 19.05.2024
    “…Spatial memory errors such as buffer overflows still rank among the top vulnerabilities in C/C++ programs…”
    Získat plný text
    Konferenční příspěvek
  6. 6

    Preventing Brute Force Attacks Against Stack Canary Protection on Networking Servers Autor Marco-Gisbert, Hector, Ripoll, Ismael

    Vydáno: IEEE 01.08.2013
    “…The buffer overflow is still an important problem despite the various protection methods developed and widely used on most systems…”
    Získat plný text
    Konferenční příspěvek
  7. 7

    Developing and Assessing a Web-Based Interactive Visualization Tool to Teach Buffer Overflow Concepts Autor Zhang, Jinghua, Yuan, Xiaohong, Johnson, Jaris, Xu, Jinsheng, Vanamala, Mounika

    ISSN: 2377-634X
    Vydáno: IEEE 21.10.2020
    “… More recently, advances in protection methods including non-executable stack, canaries, ASLR, and Windows DEP have made buffer overflow attacks a much smaller security concern, but they are…”
    Získat plný text
    Konferenční příspěvek
  8. 8

    The principle and prevention of windows buffer overflow Autor Liu Feifei

    ISBN: 9781467302418, 1467302414
    Vydáno: IEEE 01.07.2012
    “…This paper analyzes the basic principle of buffer overflow, and describes the basic methods of using the buffer overflow to attack the computer system…”
    Získat plný text
    Konferenční příspěvek
  9. 9

    Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection Systems Autor Day, D.J., Zhengxu Zhao, Minhua Ma

    ISBN: 1424458056, 9781424458059
    Vydáno: IEEE 01.02.2010
    “…There has been a significant amount of research recently into methods of protecting systems from buffer overflow attacks by detecting stack injected shell code…”
    Získat plný text
    Konferenční příspěvek
  10. 10

    The Dynamic Buffer Overflow Detection and Prevent ion Tool for Yindows Executables Using Binary Rewr iting Autor Seon-Ho Park, Young-Ju Han, Soon-Jwa Hong, Hyoung-Chun Kim, Tai-Myoung Chung

    ISBN: 9788955191318, 8955191316
    ISSN: 1738-9445
    Vydáno: IEEE 01.02.2007
    “… Our tool enables dynamically detecting and preventing of stack-based buffer overflow attacks for Windows applications, using binary rewriting method…”
    Získat plný text
    Konferenční příspěvek
  11. 11

    Transparent runtime randomization for security Autor Jun Xu, Kalbarczyk, Z., Iyer, R.K.

    ISBN: 0769519555, 9780769519555
    ISSN: 1060-9857
    Vydáno: IEEE 2003
    “… TRR dynamically and randomly relocates a program's stack, heap, shared libraries, and parts of its runtime control data structures inside the application memory address space…”
    Získat plný text
    Konferenční příspěvek
  12. 12

    LibsafeXP: A Practical and Transparent Tool for Run-time Buffer Overflow Preventions Autor Zhiqiang Lin, Bing Mao, Li Xie

    ISBN: 9781424401307, 1424401305
    Vydáno: IEEE 2006
    “…This paper presents a practical tool, LibsafeXP, to protect the software against the most common and severe attack, buffer overflows…”
    Získat plný text
    Konferenční příspěvek
  13. 13

    JITSafe: a framework against Just-in-time spraying attacks Autor Chen, Ping, Wu, Rui, Mao, Bing

    ISSN: 1751-8709, 1751-8717
    Vydáno: Stevenage The Institution of Engineering and Technology 01.12.2013
    Vydáno v IET information security (01.12.2013)
    “… It can circumvent the defenses such as data execution prevention and address space layout randomisation built-in in the modern operation system, which were thought the insurmountable barrier…”
    Získat plný text
    Journal Article
  14. 14

    Arbitrary Copy: Bypassing Buffer-Overflow Protections Autor Piromsopa, K., Enbody, R.J.

    ISBN: 0780395921, 9780780395923
    ISSN: 2154-0357
    Vydáno: IEEE 01.05.2006
    “… stack smashing, jump table). In this paper, we introduce arbitrary copy, a type of buffer-overflow attack that is capable of bypassing most buffer-overflow solutions…”
    Získat plný text
    Konferenční příspěvek
  15. 15

    The cost of preventing a buffer overflow Autor Gordonov, Anatoliy S.

    Vydáno: IEEE 01.04.2014
    “…In the paper we have considered the main methods of buffer overflows, mitigation strategies, and their influence on the memory consumption…”
    Získat plný text
    Konferenční příspěvek
  16. 16

    SeBROP: blind ROP attacks without returns Autor ZHANG, Tianning, CAI, Miao, ZHANG, Diming, HUANG, Hao

    ISSN: 2095-2228, 2095-2236
    Vydáno: Beijing Higher Education Press 01.08.2022
    Vydáno v Frontiers of Computer Science (01.08.2022)
    “…) to address these challenges. Our SeBROP can initiate a successful exploit to server-side programs using only a stack overflow vulnerability…”
    Získat plný text
    Journal Article
  17. 17

    PRODUCT SPOTLIGHT: Dust Control & Explosion Prevention

    ISSN: 1055-3223, 2160-3189
    Vydáno: Rockford Watt Global Media 01.01.2022
    Vydáno v Feed & grain (01.01.2022)
    “… * Baghouse filter with patented method for controlling and activating reverse air cleaning system…”
    Získat plný text
    Magazine Article
  18. 18

    Software defect severity estimation in presence of modern defense mechanisms Autor A. N. Fedotov, V. A. Padaryan, V. V. Kaushan, Sh. F. Kurmangaleev, A. V. Vishnyakov, A. R. Nurmukhametov

    ISSN: 2079-8156, 2220-6426
    Vydáno: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018
    “…This paper introduces a refined method for automated exploitability evaluation of found program bugs…”
    Získat plný text
    Journal Article