Výsledky vyhledávání - layout buffer overflow
-
1
Protection against Buffer Overflow Attacks through Runtime Memory Layout Randomization
Vydáno: IEEE 01.12.2014Vydáno v 2014 International Conference on Information Technology (01.12.2014)“…To date a number of comprehensive techniques have been proposed to defend against buffer over attacks…”
Získat plný text
Konferenční příspěvek -
2
Protecting against address space layout randomisation (ASLR) compromises and return-to-libc attacks using network intrusion detection systems
ISSN: 2153-182X, 2153-1838Vydáno: Beijing Springer Nature B.V 01.11.2011Vydáno v Machine intelligence research (Print) (01.11.2011)“…Writable XOR executable (W⊕X) and address space layout randomisation (ASLR) have elevated the understanding necessary to perpetrate buffer overflow exploits[1…”
Získat plný text
Journal Article -
3
DeepSanitizer: Combining Heuristic Rules and Deep Learning Models to Spot Silent Buffer Overflows in Binary
ISSN: 1545-5971, 1941-0018Vydáno: IEEE 2025Vydáno v IEEE transactions on dependable and secure computing (2025)“…Memory sanitizer is a widely employed technique that serves as the frontline in the detection and analysis of memory corruption bugs, such as buffer overflows…”
Získat plný text
Journal Article -
4
Run-time optimisation of sewer remote control systems using genetic algorithms and multi-criteria decision analysis: CSO and energy consumption reduction
ISSN: 1028-6608, 1029-0249Vydáno: Basingstoke Taylor & Francis 02.04.2020Vydáno v Civil engineering and environmental systems (02.04.2020)“… A run-time multi-objective decision method was developed and applied to a case study with the aim of minimising water overflow and electric energy consumption of the upstream water collection system…”
Získat plný text
Journal Article -
5
On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer Overflows
Vydáno: IEEE 01.08.2014Vydáno v 2014 IEEE 13th International Symposium on Network Computing and Applications (01.08.2014)“…) are techniques for defending systems against buffer overflow attacks but not limited to them. These mechanism are available in modern operating systems like Android, GNU/Linux and Windows…”
Získat plný text
Konferenční příspěvek -
6
A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques
Vydáno: IEEE 25.08.2023Vydáno v 2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS) (25.08.2023)“…) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior…”
Získat plný text
Konferenční příspěvek -
7
Elevating Parallel Shadow Stack Concepts for Architectures with Register Windows
ISSN: 1545-5971, 1941-0018Vydáno: IEEE 2025Vydáno v IEEE transactions on dependable and secure computing (2025)“…Register windows are a processor feature that was originally developed to reduce the frequency for register spilling. This paper investigates how this…”
Získat plný text
Journal Article -
8
Surgically Returning to Randomized lib(c)
ISBN: 1424453275, 076953919X, 9780769539195, 9781424453276ISSN: 1063-9527Vydáno: IEEE 01.12.2009Vydáno v 2009 Annual Computer Security Applications Conference (01.12.2009)“… is based on the leakage of sensitive information about the memory layout of the process. Using our attack an attacker can exploit the majority of programs vulnerable to stack-based buffer overflows surgically, i.e…”
Získat plný text
Konferenční příspěvek -
9
An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques
ISSN: 2076-3417, 2076-3417Vydáno: Basel MDPI AG 01.07.2022Vydáno v Applied sciences (01.07.2022)“…Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system…”
Získat plný text
Journal Article -
10
Buffer overflow vulnerabilities in CUDA: a preliminary analysis
ISSN: 2263-8733, 2263-8733Vydáno: Paris Springer Paris 01.05.2016Vydáno v Journal of computer virology and hacking techniques (01.05.2016)“…We present a preliminary study of buffer overflow vulnerabilities in CUDA software running on GPUs…”
Získat plný text
Journal Article -
11
Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags
ISSN: 2375-1207Vydáno: IEEE 19.05.2024Vydáno v Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)“…Spatial memory errors such as buffer overflows still rank among the top vulnerabilities in C/C++ programs…”
Získat plný text
Konferenční příspěvek -
12
Exploiting stack-based buffer overflow using modern day techniques
ISSN: 1877-0509, 1877-0509Vydáno: Elsevier B.V 2019Vydáno v Procedia computer science (2019)“…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow…”
Získat plný text
Journal Article -
13
Hardware Support for Low-Cost Memory Safety
Vydáno: IEEE 01.06.2021Vydáno v 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S) (01.06.2021)“…Programs written in C/C++ are vulnerable to memory-safety errors like buffer-overflows and use-after-free…”
Získat plný text
Konferenční příspěvek -
14
StackSpecter: Detecting Stack Buffer Overflows for the Xtensa Architecture
ISSN: 2474-154XVydáno: IEEE 27.11.2024Vydáno v Australasian Telecommunication Networks and Applications Conference [proceedings] (27.11.2024)“…This paper presents a new approach, StackSpecter, for stack buffer overflow detection, specifically for architectures with register windows…”
Získat plný text
Konferenční příspěvek -
15
Crosschecking Distributed Data to Detect Integer Overflow
ISSN: 1548-0992, 1548-0992Vydáno: Los Alamitos IEEE 01.04.2015Vydáno v Revista IEEE América Latina (01.04.2015)“… The integer range analysis is one strategy to detect integer overflow occurrences in programs…”
Získat plný text
Journal Article -
16
Revealing the exploitability of heap overflow through PoC analysis
ISSN: 2523-3246, 2523-3246Vydáno: Singapore Springer Nature Singapore 01.12.2024Vydáno v Cybersecurity (Singapore) (01.12.2024)“… However, the exploitable heap layout cannot fully demonstrate the exploitability of a vulnerability, as it is uncertain whether the attacker can control the data covered by the overflow…”
Získat plný text
Journal Article -
17
Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted ‘Internet of Healthcare Things’ network
ISSN: 0140-3664, 1873-703XVydáno: Elsevier B.V 01.01.2022Vydáno v Computer communications (01.01.2022)“…, resulting in loss of critical medical information due to buffer loss and channel loss, which is unacceptable. In this paper, we explored different applications…”
Získat plný text
Journal Article -
18
Buffer Overflow Vulnerability Location in Binaries Based on Abnormal Execution
Vydáno: IEEE 01.09.2020Vydáno v 2020 4th Annual International Conference on Data Science and Business Analytics (ICDSBA) (01.09.2020)“…Buffer overflow is a very common and dangerous vulnerability. Now there are many methods and tools for this vulnerability, but it is difficult to locate it in binary code…”
Získat plný text
Konferenční příspěvek -
19
Enhancing in-process isolation for robust defense against information disclosure attacks
ISSN: 0167-4048Vydáno: Elsevier Ltd 01.05.2025Vydáno v Computers & security (01.05.2025)“… To safeguard against these malicious attacks, researchers have developed various methods, such as Address Space Layout Randomization (ASLR…”
Získat plný text
Journal Article -
20
A Survey of Research on Runtime Rerandomization Under Memory Disclosure
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 2019Vydáno v IEEE access (2019)“… As an important defense against attacks based on address space layout, code randomization technology effectively defends code-reuse attack by randomizing memory address space…”
Získat plný text
Journal Article

