Search Results - buffer overflow vulnerability diagnosis

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities by Chen, Gang, Jin, Hai, Zou, Deqing, Zhou, Bing Bing, Liang, Zhenkai, Zheng, Weide, Shi, Xuanhua

    ISSN: 1545-5971, 1941-0018
    Published: Washington IEEE 01.11.2013
    “… This paper presents SafeStack, a system that can automatically diagnose and patch stack-based buffer overflow vulnerabilities…”
    Get full text
    Journal Article
  2. 2

    Buffer overflow vulnerability diagnosis for commodity software by Zheng, Jiang

    ISBN: 9781109053999, 1109053991
    Published: ProQuest Dissertations & Theses 01.01.2008
    “… The existence of buffer overflow vulnerabilities makes the system susceptible to Internet worms and denial of service (DDoS…”
    Get full text
    Dissertation
  3. 3

    Memory Vulnerability Diagnosis for Binary Program by Tang, Feng-Yi, Feng, Chao, Tang, Chao-Jing

    ISSN: 2271-2097, 2431-7578, 2271-2097
    Published: Les Ulis EDP Sciences 2016
    Published in ITM web of conferences (2016)
    “… The diagnosis methods target at buffer overflow, use after free (UAF) and format string vulnerabilities…”
    Get full text
    Journal Article Conference Proceeding
  4. 4

    A fine-grained classification and security analysis of web-based virtual machine vulnerabilities by Yilmaz, Fadi, Sridhar, Meera, Mohanty, Abhinav, Tendulkar, Vasant, Hamlen, Kevin W.

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.06.2021
    Published in Computers & security (01.06.2021)
    “… The design and implementation of Inscription, the first fully automated Adobe Flash binary code transformation system that can guard major Flash vulnerability categories without modifying vulnerable…”
    Get full text
    Journal Article
  5. 5

    Exploitation Analysis of Buffer Overflow in SL-Mail Server by Shafana, N. Jeenath, Pawar, Kshitij

    ISSN: 2768-0673
    Published: IEEE 11.11.2021
    “… Buffer overflows are the vulnerabilities which are exploited due copying function which aren't set to be bounded…”
    Get full text
    Conference Proceeding
  6. 6

    Exploiting Control Device Vulnerabilities: Attacking Cyber-Physical Water System by Sindhwad, Parul, Kazi, Faruk

    ISSN: 2305-7254
    Published: FRUCT Oy 09.11.2022
    “…), Buffer overflow, privilege escalation, and illegal command injection attacks are executed, and their impacts are investigated using CIA and STRIDE threat modeling…”
    Get full text
    Conference Proceeding
  7. 7

    LLM-Based Approach for Buffer Overflow Detection in Source Code by Kaanan, Emran, Karim, Tasmin, Hossain Shaon, Md. Shazzad, Fahim Sultan, Md, Cuzzocrea, Alfredo, Akter, Mst Shapna

    ISSN: 2474-9656
    Published: IEEE 20.12.2024
    Published in Computer and information technology (20.12.2024)
    “… One major security issue is CWE-120, which deals with buffer overflow vulnerabilities…”
    Get full text
    Conference Proceeding
  8. 8

    Reversing to detect software vulnerabilities by Goncalves de Oliveira, Bruno, Vitali, Maycon, Watanabe, Willian Massami

    Published: AISTI 01.06.2017
    “… Software disassembling is an interesting approach to discover vulnerabilities. Unmounting an application into Assembly code can reveal multiple characteristics from the software…”
    Get full text
    Conference Proceeding
  9. 9

    HeapTherapy: An Efficient End-to-End Solution against Heap Buffer Overflows by Qiang Zeng, Mingyi Zhao, Peng Liu

    ISSN: 1530-0889
    Published: IEEE 01.06.2015
    “…For decades buffer overflows have been one of the most prevalent and dangerous software vulnerabilities…”
    Get full text
    Conference Proceeding
  10. 10

    Improving software security with concurrent monitoring, automated diagnosis, and self-shielding by Zeng, Qiang

    ISBN: 1321578512, 9781321578515
    Published: ProQuest Dissertations & Theses 01.01.2014
    “…The society nowadays relies heavily on digitized information and services. Among others, cyber-security is one of the cornerstones of the digital world. The…”
    Get full text
    Dissertation
  11. 11

    Static Security Analysis Based on Input-Related Software Faults by Nagy, C., Mancoridis, S.

    ISBN: 1424437555, 0769535895, 9781424437559, 9780769535890
    ISSN: 1534-5351
    Published: IEEE 01.03.2009
    “… The main contributions of this work are two metrics to help locate faults during a code review, and algorithms to locate buffer overflow and format string vulnerabilities in C source code…”
    Get full text
    Conference Proceeding
  12. 12

    Improving Software Reliability via Record and Replay by Liu, Hongyu

    ISBN: 1392363314, 9781392363317
    Published: ProQuest Dissertations & Theses 01.01.2019
    “…Although sophisticated techniques are adopted for software testing, most in-production software contains latent bugs. Fixing bugs may take weeks, or even…”
    Get full text
    Dissertation