Search Results - buffer overflow vulnerability diagnosis
-
1
SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
ISSN: 1545-5971, 1941-0018Published: Washington IEEE 01.11.2013Published in IEEE transactions on dependable and secure computing (01.11.2013)“… This paper presents SafeStack, a system that can automatically diagnose and patch stack-based buffer overflow vulnerabilities…”
Get full text
Journal Article -
2
Buffer overflow vulnerability diagnosis for commodity software
ISBN: 9781109053999, 1109053991Published: ProQuest Dissertations & Theses 01.01.2008“… The existence of buffer overflow vulnerabilities makes the system susceptible to Internet worms and denial of service (DDoS…”
Get full text
Dissertation -
3
Memory Vulnerability Diagnosis for Binary Program
ISSN: 2271-2097, 2431-7578, 2271-2097Published: Les Ulis EDP Sciences 2016Published in ITM web of conferences (2016)“… The diagnosis methods target at buffer overflow, use after free (UAF) and format string vulnerabilities…”
Get full text
Journal Article Conference Proceeding -
4
A fine-grained classification and security analysis of web-based virtual machine vulnerabilities
ISSN: 0167-4048, 1872-6208Published: Amsterdam Elsevier Ltd 01.06.2021Published in Computers & security (01.06.2021)“… The design and implementation of Inscription, the first fully automated Adobe Flash binary code transformation system that can guard major Flash vulnerability categories without modifying vulnerable…”
Get full text
Journal Article -
5
Exploitation Analysis of Buffer Overflow in SL-Mail Server
ISSN: 2768-0673Published: IEEE 11.11.2021Published in International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (Online) (11.11.2021)“… Buffer overflows are the vulnerabilities which are exploited due copying function which aren't set to be bounded…”
Get full text
Conference Proceeding -
6
Exploiting Control Device Vulnerabilities: Attacking Cyber-Physical Water System
ISSN: 2305-7254Published: FRUCT Oy 09.11.2022Published in Proceedings of the XXth Conference of Open Innovations Association FRUCT (09.11.2022)“…), Buffer overflow, privilege escalation, and illegal command injection attacks are executed, and their impacts are investigated using CIA and STRIDE threat modeling…”
Get full text
Conference Proceeding -
7
LLM-Based Approach for Buffer Overflow Detection in Source Code
ISSN: 2474-9656Published: IEEE 20.12.2024Published in Computer and information technology (20.12.2024)“… One major security issue is CWE-120, which deals with buffer overflow vulnerabilities…”
Get full text
Conference Proceeding -
8
Reversing to detect software vulnerabilities
Published: AISTI 01.06.2017Published in 2017 12th Iberian Conference on Information Systems and Technologies (CISTI) (01.06.2017)“… Software disassembling is an interesting approach to discover vulnerabilities. Unmounting an application into Assembly code can reveal multiple characteristics from the software…”
Get full text
Conference Proceeding -
9
HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows
ISSN: 1530-0889Published: IEEE 01.06.2015Published in Proceedings - International Conference on Dependable Systems and Networks (01.06.2015)“…For decades buffer overflows have been one of the most prevalent and dangerous software vulnerabilities…”
Get full text
Conference Proceeding -
10
Improving software security with concurrent monitoring, automated diagnosis, and self-shielding
ISBN: 1321578512, 9781321578515Published: ProQuest Dissertations & Theses 01.01.2014“…The society nowadays relies heavily on digitized information and services. Among others, cyber-security is one of the cornerstones of the digital world. The…”
Get full text
Dissertation -
11
Static Security Analysis Based on Input-Related Software Faults
ISBN: 1424437555, 0769535895, 9781424437559, 9780769535890ISSN: 1534-5351Published: IEEE 01.03.2009Published in 2009 13th European Conference on Software Maintenance and Reengineering (01.03.2009)“… The main contributions of this work are two metrics to help locate faults during a code review, and algorithms to locate buffer overflow and format string vulnerabilities in C source code…”
Get full text
Conference Proceeding -
12
Improving Software Reliability via Record and Replay
ISBN: 1392363314, 9781392363317Published: ProQuest Dissertations & Theses 01.01.2019“…Although sophisticated techniques are adopted for software testing, most in-production software contains latent bugs. Fixing bugs may take weeks, or even…”
Get full text
Dissertation

