Výsledky vyhledávání - buffer-overflow vulnerability detection

  1. 1

    BovdGFE: buffer overflow vulnerability detection based on graph feature extraction Autor Lv, Xinghang, Peng, Tao, Chen, Jia, Liu, Junping, Hu, Xinrong, He, Ruhan, Jiang, Minghua, Cao, Wenli

    ISSN: 0924-669X, 1573-7497
    Vydáno: New York Springer US 01.06.2023
    “…Automatically detecting buffer overflow vulnerabilities is an important research topic in software security…”
    Získat plný text
    Journal Article
  2. 2

    Buffer Overflow Vulnerability Detection Based on Unsafe Function Invocation Autor Zhao, Xianda, Huang, Shuguang, Pan, Zulie, Hui, Huang

    ISSN: 1742-6588, 1742-6596
    Vydáno: Bristol IOP Publishing 01.06.2020
    Vydáno v Journal of physics. Conference series (01.06.2020)
    “… In order to effectively mitigate buffer vulnerabilities, we proposed a buffer overflow vulnerability detection technique based on unsafe function invocation…”
    Získat plný text
    Journal Article
  3. 3

    BofAEG: Automated Stack Buffer Overflow Vulnerability Detection and Exploit Generation Based on Symbolic Execution and Dynamic Analysis Autor Xu, Shenglin, Wang, Yongjun

    ISSN: 1939-0114, 1939-0122
    Vydáno: London Hindawi 22.06.2022
    Vydáno v Security and communication networks (22.06.2022)
    “…Stack buffer overflow vulnerability is a common software vulnerability that can overwrite function return addresses and hijack program control flow, causing serious system problems…”
    Získat plný text
    Journal Article
  4. 4

    Smart fuzzing method for detecting stack-based buffer overflow in binary codes Autor Mouzarani, Maryam, Sadeghiyan, Babak, Zolfaghari, Mohammad

    ISSN: 1751-8806, 1751-8814, 1751-8814
    Vydáno: The Institution of Engineering and Technology 01.08.2016
    Vydáno v IET software (01.08.2016)
    “…During the past decades several methods have been proposed to detect the stack-based buffer overflow vulnerability, though it is still a serious threat to the computer systems…”
    Získat plný text
    Journal Article
  5. 5
  6. 6

    Buffer Overflow Vulnerability Detection Based on Static Analysis-assisted Symbolic Execution Autor Wang, Wenhui, Zhwng, PEngland, Wei, Guichen, Ge, Zhenwei, Qin, Zhongyuan, Sun, Xin

    Vydáno: IEEE 18.08.2023
    “…Buffer overflow is a common exploitable high-risk vulnerability that can lead to arbitrary code execution, thus effective detection of buffer overflow vulnerability is of utmost importance…”
    Získat plný text
    Konferenční příspěvek
  7. 7

    A combinatorial approach to detecting buffer overflow vulnerabilities Autor Wenhua Wang, Yu Lei, Donggang Liu, Kung, D., Csallner, C., Dazhi Zhang, Kacker, R., Kuhn, R.

    ISBN: 9781424492329, 1424492327
    ISSN: 1530-0889
    Vydáno: IEEE 01.06.2011
    “… In this paper, we present a black-box testing approach to detecting buffer overflow vulnerabilities…”
    Získat plný text
    Konferenční příspěvek
  8. 8
  9. 9

    ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis Autor Xu, Lili, Xu, Mingjie, Li, Feng, Huo, Wei

    ISSN: 2523-3246, 2523-3246
    Vydáno: Singapore Springer Singapore 08.09.2020
    Vydáno v Cybersecurity (Singapore) (08.09.2020)
    “…The Integer-Overflow-to-Buffer-Overflow (IO2BO) vulnerability has been widely exploited by attackers to cause severe damages to computer systems…”
    Získat plný text
    Journal Article
  10. 10

    Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities Autor Pasupulati, A., Coit, J., Levitt, K., Wu, S.F., Li, S.H., Kuo, J.C., Fan, K.P.

    ISBN: 0780382307, 9780780382305
    ISSN: 1542-1201
    Vydáno: Piscataway NJ IEEE 2004
    “… In this paper, we propose a simple solution called "Buttercup" to counter against attacks based on buffer-overflow exploits…”
    Získat plný text
    Konferenční příspěvek
  11. 11

    PwnMaster: Automatic Buffer Overflow and Format String Vulnerability Detection and Exploitation Autor Petrean, Florin, Colesa, Adrian

    ISBN: 9798350361919
    ISSN: 1844-7872
    Vydáno: IEEE 16.05.2024
    “…Automated detection tools play a crucial role in assisting researchers to identify and rectify existing software flaws…”
    Získat plný text
    Konferenční příspěvek
  12. 12

    Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis Autor Ying, Huan, Zhang, Yanmiao, Han, Lifang, Cheng, Yushi, Li, Jiyuan, Ji, Xiaoyu, Xu, Wenyuan

    Vydáno: IEEE 01.03.2019
    “… In this paper, we propose a novel approach that detects existing buffer-overflow vulnerabilities of terminal devices via automatic static analysis (ASA…”
    Získat plný text
    Konferenční příspěvek
  13. 13

    Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects Autor Pereira, Jose D'Abruzzo, Ivaki, Naghmeh, Vieira, Marco

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 2021
    Vydáno v IEEE access (2021)
    “… Nevertheless, most buffer overflow vulnerabilities are not detectable by vulnerability detection tools and static analysis tools (SATs…”
    Získat plný text
    Journal Article
  14. 14

    Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks Autor Akter, Mst Shapna, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Cuzzocrea, Alfredo

    ISSN: 2331-8422
    Vydáno: Ithaca Cornell University Library, arXiv.org 01.06.2023
    Vydáno v arXiv.org (01.06.2023)
    “… open-source code containing millions of functions with potential buffer overflow exploits…”
    Získat plný text
    Paper
  15. 15

    What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability Autor Cruzes, Daniela Soares, Chaim, Marcos Lordello, Santos, Daniel Soares

    ISSN: 2640-4265, 2640-4273
    Vydáno: Hershey IGI Global 01.07.2018
    “…Buffer overflow (BO) is a well-known and widely exploited security vulnerability…”
    Získat plný text
    Journal Article
  16. 16

    Static Analysis Method for Detecting Buffer Overflow Vulnerabilities Autor Puchkov, F. M., Shapchenko, K. A.

    ISSN: 0361-7688, 1608-3261
    Vydáno: New York Springer Nature B.V 01.07.2005
    Vydáno v Programming and computer software (01.07.2005)
    “…In this paper, a new static method for automated detection of vulnerabilities that could result in buffer overflows in programs is suggested…”
    Získat plný text
    Journal Article
  17. 17

    Research on Dynamic Detection Method of Buffer Overflow Vulnerabilities Based on Complete Boundary Test Autor Li, Zesong, Yang, Hui, Ge, Junwei, Yu, Qinyong

    Vydáno: IEEE 11.12.2020
    “… For this kind of software and its running environment, it is difficult to reduce the false positive rate and false negative rate with traditional static detection method for buffer overflow…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    Poster: Analytical Study on Large Language Models' Detection Capability for Buffer Overflow and Integer Overflow Vulnerabilities Autor Cao, Xiaohong, Xie, Wanling, Zhang, Yu, Xue, Caixia, Shi, Lin, Zhang, Huajun

    ISSN: 2158-9208
    Vydáno: IEEE 10.10.2025
    “… However, systematic investigation of LLMs for buffer and integer overflows vulnerabilityies detection remains notably lacking…”
    Získat plný text
    Konferenční příspěvek
  19. 19

    A method for detecting buffer overflow vulnerabilities Autor Jingbo Yuan, Shunli Ding

    ISBN: 9781612844855, 1612844855
    Vydáno: IEEE 01.05.2011
    “… The paper presents a method that combines static analysis with dynamic test to deal with the problem on buffer overflow vulnerabilities detecting…”
    Získat plný text
    Konferenční příspěvek
  20. 20

    Light-Weight Rule-Based Test Case Generation for Detecting Buffer Overflow Vulnerabilities Autor Padmanabhuni, Bindu Madhavi, Kuan Tan, Hee Beng

    Vydáno: IEEE 01.05.2015
    “… Despite existence of many detection solutions, buffer overflow bugs are widely being reported in multitude of applications suggesting either inherent limitations in current solutions or problems…”
    Získat plný text
    Konferenční příspěvek