Suchergebnisse - buffer overflow

  1. 1

    SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities von Chen, Gang, Jin, Hai, Zou, Deqing, Zhou, Bing Bing, Liang, Zhenkai, Zheng, Weide, Shi, Xuanhua

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: Washington IEEE 01.11.2013
    “… Buffer overflow attacks still pose a significant threat to the security and availability of today's computer systems …”
    Volltext
    Journal Article
  2. 2

    Defeating Buffer Overflow: A Trivial but Dangerous Bug von Black, Paul E., Bojanova, Irena

    ISSN: 1520-9202, 1941-045X
    Veröffentlicht: United States IEEE 01.11.2016
    Veröffentlicht in IT professional (01.11.2016)
    “… With the C programming language comes buffer overflows. Because it is unlikely that the use of C will stop any time soon, the authors present some ways to deal …”
    Volltext
    Journal Article
  3. 3

    Smart fuzzing method for detecting stack-based buffer overflow in binary codes von Mouzarani, Maryam, Sadeghiyan, Babak, Zolfaghari, Mohammad

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Veröffentlicht: The Institution of Engineering and Technology 01.08.2016
    Veröffentlicht in IET software (01.08.2016)
    “… During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the computer systems …”
    Volltext
    Journal Article
  4. 4

    Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis von Padmanabhuni, Bindu Madhavi, Tan, Hee Beng Kuan

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Veröffentlicht: The Institution of Engineering and Technology 01.04.2016
    Veröffentlicht in IET software (01.04.2016)
    “… Buffer overflow (BOF) vulnerabilities when present in code can be exploited to violate security objectives such as availability, confidentiality and integrity …”
    Volltext
    Journal Article
  5. 5

    Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing von Barakat, Ramon, Josten, Silvan, Schneider, Martin A.

    ISSN: 2375-0227
    Veröffentlicht: IEEE 21.10.2024
    “… Buffer overflows remain one of the most critical and widespread vulnerabilities in software systems …”
    Volltext
    Tagungsbericht
  6. 6

    ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis von Xu, Lili, Xu, Mingjie, Li, Feng, Huo, Wei

    ISSN: 2523-3246, 2523-3246
    Veröffentlicht: Singapore Springer Singapore 08.09.2020
    Veröffentlicht in Cybersecurity (Singapore) (08.09.2020)
    “… The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems …”
    Volltext
    Journal Article
  7. 7

    Efficient Buffer Overflow Detection on GPU von Di, Bang, Sun, Jianhua, Chen, Hao, Li, Dong

    ISSN: 1045-9219, 1558-2183
    Veröffentlicht: New York IEEE 01.05.2021
    “… However, when GPU kernels co-run, it is possible that one kernel can leverage buffer overflow to attack another kernel running on the same GPU …”
    Volltext
    Journal Article
  8. 8

    What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability von Cruzes, Daniela Soares, Chaim, Marcos Lordello, Santos, Daniel Soares

    ISSN: 2640-4265, 2640-4273
    Veröffentlicht: Hershey IGI Global 01.07.2018
    “… Buffer overflow (BO) is a well-known and widely exploited security vulnerability …”
    Volltext
    Journal Article
  9. 9

    DeepSanitizer: Combining Heuristic Rules and Deep Learning Models to Spot Silent Buffer Overflows in Binary von Wang, Zhilong, Cao, Chen, Yu, Li, Wang, Suhang, Sun, Xiaoyan, Liu, Peng

    ISSN: 1545-5971, 1941-0018
    Veröffentlicht: IEEE 2025
    “… Memory sanitizer is a widely employed technique that serves as the frontline in the detection and analysis of memory corruption bugs, such as buffer overflows …”
    Volltext
    Journal Article
  10. 10

    Automatic Buffer Overflow Warning Validation von Gao, Feng-Juan, Wang, Yu, Wang, Lin-Zhang, Yang, Zijiang, Li, Xuan-Dong

    ISSN: 1000-9000, 1860-4749
    Veröffentlicht: Singapore Springer Singapore 01.11.2020
    Veröffentlicht in Journal of computer science and technology (01.11.2020)
    “… Static buffer overflow detection techniques tend to report too many false positives fundamentally due to the lack of software execution information …”
    Volltext
    Journal Article
  11. 11

    BovdGFE: buffer overflow vulnerability detection based on graph feature extraction von Lv, Xinghang, Peng, Tao, Chen, Jia, Liu, Junping, Hu, Xinrong, He, Ruhan, Jiang, Minghua, Cao, Wenli

    ISSN: 0924-669X, 1573-7497
    Veröffentlicht: New York Springer US 01.06.2023
    Veröffentlicht in Applied intelligence (Dordrecht, Netherlands) (01.06.2023)
    “… Automatically detecting buffer overflow vulnerabilities is an important research topic in software security …”
    Volltext
    Journal Article
  12. 12

    Buffer overflow attacks : detect, exploit, prevent von Foster, James C.

    ISBN: 9781932266672, 1932266674
    Veröffentlicht: Rockland, Mass Syngress 2005
    “… The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer …”
    Volltext
    E-Book Buch
  13. 13

    Exploiting stack-based buffer overflow using modern day techniques von Nicula, Ștefan, Zota, Răzvan Daniel

    ISSN: 1877-0509, 1877-0509
    Veröffentlicht: Elsevier B.V 2019
    Veröffentlicht in Procedia computer science (2019)
    “… One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow …”
    Volltext
    Journal Article
  14. 14

    An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques von Butt, Muhammad Arif, Ajmal, Zarafshan, Khan, Zafar Iqbal, Idrees, Muhammad, Javed, Yasir

    ISSN: 2076-3417, 2076-3417
    Veröffentlicht: Basel MDPI AG 01.07.2022
    Veröffentlicht in Applied sciences (01.07.2022)
    “… Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system …”
    Volltext
    Journal Article
  15. 15

    Boreas: Semantic-Aware Framework for Buffer Overflow Detection to Reduce Carbon Footprint in IoT Devices von Chen, Xiao, Sha, Letian, Gao, Qingguan, Xiao, Fu, Pan, Jiaye

    ISSN: 2327-4662, 2327-4662
    Veröffentlicht: Piscataway IEEE 01.09.2025
    Veröffentlicht in IEEE internet of things journal (01.09.2025)
    “… The widespread presence of buffer overflow (BOF) vulnerabilities in IoT devices not only threatens devices but also leads to increased carbon emissions …”
    Volltext
    Journal Article
  16. 16

    Static detection of real-world buffer overflow induced by loop von Luo, Peng, Zou, Deqing, Du, Yajuan, Jin, Hai, Liu, Changming, Shen, Jinan

    ISSN: 0167-4048, 1872-6208
    Veröffentlicht: Amsterdam Elsevier Ltd 01.02.2020
    Veröffentlicht in Computers & security (01.02.2020)
    “… Buffer overflow (BoF) is one of the most dangerous security vulnerabilities. A BoF can be induced by functions, such as the memcpy family, or loops with pointer or array operations …”
    Volltext
    Journal Article
  17. 17

    Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects von Pereira, Jose D'Abruzzo, Ivaki, Naghmeh, Vieira, Marco

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2021
    Veröffentlicht in IEEE access (2021)
    “… Issues with memory management, in particular buffer overflow, are among the most frequently exploited vulnerabilities in software systems developed in C/C++ …”
    Volltext
    Journal Article
  18. 18

    A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device von Xu, Bin, Wang, Weike, Hao, Qiang, Zhang, Zhun, Du, Pei, Xia, Tongsheng, Li, Hongge, Wang, Xiang

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2018
    Veröffentlicht in IEEE access (2018)
    “… At present, the IoT devices face many kinds of software and hardware attacks, especially buffer overflow attacks …”
    Volltext
    Journal Article
  19. 19

    Use of Ensemble Learning to Detect Buffer Overflow Exploitation von Youssef, Ayman, Abdelrazek, Mohamed, Karmakar, Chandan

    ISSN: 2169-3536, 2169-3536
    Veröffentlicht: Piscataway IEEE 2023
    Veröffentlicht in IEEE access (2023)
    “… We focus on buffer overflow vulnerabilities in user-space applications within Windows Operating Systems (OS …”
    Volltext
    Journal Article
  20. 20

    Hardware Assisted Buffer Protection Mechanisms for Embedded RISC-V von De, Asmit, Basu, Aditya, Ghosh, Swaroop, Jaeger, Trent

    ISSN: 0278-0070, 1937-4151
    Veröffentlicht: New York IEEE 01.12.2020
    “… Programs compiled using RISC-V toolchains are still vulnerable to code injection and code reuse attacks, such as buffer overflow and return-oriented programming (ROP …”
    Volltext
    Journal Article