Suchergebnisse - buffer overflow
-
1
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
ISSN: 1545-5971, 1941-0018Veröffentlicht: Washington IEEE 01.11.2013Veröffentlicht in IEEE transactions on dependable and secure computing (01.11.2013)“… Buffer overflow attacks still pose a significant threat to the security and availability of today's computer systems …”
Volltext
Journal Article -
2
Defeating Buffer Overflow: A Trivial but Dangerous Bug
ISSN: 1520-9202, 1941-045XVeröffentlicht: United States IEEE 01.11.2016Veröffentlicht in IT professional (01.11.2016)“… With the C programming language comes buffer overflows. Because it is unlikely that the use of C will stop any time soon, the authors present some ways to deal …”
Volltext
Journal Article -
3
Smart fuzzing method for detecting stack-based buffer overflow in binary codes
ISSN: 1751-8806, 1751-8814, 1751-8814Veröffentlicht: The Institution of Engineering and Technology 01.08.2016Veröffentlicht in IET software (01.08.2016)“… During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the computer systems …”
Volltext
Journal Article -
4
Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis
ISSN: 1751-8806, 1751-8814, 1751-8814Veröffentlicht: The Institution of Engineering and Technology 01.04.2016Veröffentlicht in IET software (01.04.2016)“… Buffer overflow (BOF) vulnerabilities when present in code can be exploited to violate security objectives such as availability, confidentiality and integrity …”
Volltext
Journal Article -
5
Buffer Access Monitoring for Enhanced Buffer Overflow Detection in Fuzzing
ISSN: 2375-0227Veröffentlicht: IEEE 21.10.2024Veröffentlicht in Proceedings - International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (21.10.2024)“… Buffer overflows remain one of the most critical and widespread vulnerabilities in software systems …”
Volltext
Tagungsbericht -
6
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
ISSN: 2523-3246, 2523-3246Veröffentlicht: Singapore Springer Singapore 08.09.2020Veröffentlicht in Cybersecurity (Singapore) (08.09.2020)“… The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems …”
Volltext
Journal Article -
7
Efficient Buffer Overflow Detection on GPU
ISSN: 1045-9219, 1558-2183Veröffentlicht: New York IEEE 01.05.2021Veröffentlicht in IEEE transactions on parallel and distributed systems (01.05.2021)“… However, when GPU kernels co-run, it is possible that one kernel can leverage buffer overflow to attack another kernel running on the same GPU …”
Volltext
Journal Article -
8
What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability
ISSN: 2640-4265, 2640-4273Veröffentlicht: Hershey IGI Global 01.07.2018Veröffentlicht in International journal of systems and software security and protection (01.07.2018)“… Buffer overflow (BO) is a well-known and widely exploited security vulnerability …”
Volltext
Journal Article -
9
DeepSanitizer: Combining Heuristic Rules and Deep Learning Models to Spot Silent Buffer Overflows in Binary
ISSN: 1545-5971, 1941-0018Veröffentlicht: IEEE 2025Veröffentlicht in IEEE transactions on dependable and secure computing (2025)“… Memory sanitizer is a widely employed technique that serves as the frontline in the detection and analysis of memory corruption bugs, such as buffer overflows …”
Volltext
Journal Article -
10
Automatic Buffer Overflow Warning Validation
ISSN: 1000-9000, 1860-4749Veröffentlicht: Singapore Springer Singapore 01.11.2020Veröffentlicht in Journal of computer science and technology (01.11.2020)“… Static buffer overflow detection techniques tend to report too many false positives fundamentally due to the lack of software execution information …”
Volltext
Journal Article -
11
BovdGFE: buffer overflow vulnerability detection based on graph feature extraction
ISSN: 0924-669X, 1573-7497Veröffentlicht: New York Springer US 01.06.2023Veröffentlicht in Applied intelligence (Dordrecht, Netherlands) (01.06.2023)“… Automatically detecting buffer overflow vulnerabilities is an important research topic in software security …”
Volltext
Journal Article -
12
Buffer overflow attacks : detect, exploit, prevent
ISBN: 9781932266672, 1932266674Veröffentlicht: Rockland, Mass Syngress 2005“… The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer …”
Volltext
E-Book Buch -
13
Exploiting stack-based buffer overflow using modern day techniques
ISSN: 1877-0509, 1877-0509Veröffentlicht: Elsevier B.V 2019Veröffentlicht in Procedia computer science (2019)“… One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow …”
Volltext
Journal Article -
14
An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques
ISSN: 2076-3417, 2076-3417Veröffentlicht: Basel MDPI AG 01.07.2022Veröffentlicht in Applied sciences (01.07.2022)“… Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system …”
Volltext
Journal Article -
15
Boreas: Semantic-Aware Framework for Buffer Overflow Detection to Reduce Carbon Footprint in IoT Devices
ISSN: 2327-4662, 2327-4662Veröffentlicht: Piscataway IEEE 01.09.2025Veröffentlicht in IEEE internet of things journal (01.09.2025)“… The widespread presence of buffer overflow (BOF) vulnerabilities in IoT devices not only threatens devices but also leads to increased carbon emissions …”
Volltext
Journal Article -
16
Static detection of real-world buffer overflow induced by loop
ISSN: 0167-4048, 1872-6208Veröffentlicht: Amsterdam Elsevier Ltd 01.02.2020Veröffentlicht in Computers & security (01.02.2020)“… Buffer overflow (BoF) is one of the most dangerous security vulnerabilities. A BoF can be induced by functions, such as the memcpy family, or loops with pointer or array operations …”
Volltext
Journal Article -
17
Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects
ISSN: 2169-3536, 2169-3536Veröffentlicht: Piscataway IEEE 2021Veröffentlicht in IEEE access (2021)“… Issues with memory management, in particular buffer overflow, are among the most frequently exploited vulnerabilities in software systems developed in C/C++ …”
Volltext
Journal Article -
18
A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device
ISSN: 2169-3536, 2169-3536Veröffentlicht: Piscataway IEEE 2018Veröffentlicht in IEEE access (2018)“… At present, the IoT devices face many kinds of software and hardware attacks, especially buffer overflow attacks …”
Volltext
Journal Article -
19
Use of Ensemble Learning to Detect Buffer Overflow Exploitation
ISSN: 2169-3536, 2169-3536Veröffentlicht: Piscataway IEEE 2023Veröffentlicht in IEEE access (2023)“… We focus on buffer overflow vulnerabilities in user-space applications within Windows Operating Systems (OS …”
Volltext
Journal Article -
20
Hardware Assisted Buffer Protection Mechanisms for Embedded RISC-V
ISSN: 0278-0070, 1937-4151Veröffentlicht: New York IEEE 01.12.2020Veröffentlicht in IEEE transactions on computer-aided design of integrated circuits and systems (01.12.2020)“… Programs compiled using RISC-V toolchains are still vulnerable to code injection and code reuse attacks, such as buffer overflow and return-oriented programming (ROP …”
Volltext
Journal Article

