Výsledky vyhledávání - layout buffer overflow

  1. 1

    Protection against Buffer Overflow Attacks through Runtime Memory Layout Randomization Autor Kumar, K. Shiva, Kisore, N. Raghu

    Vydáno: IEEE 01.12.2014
    “…To date a number of comprehensive techniques have been proposed to defend against buffer over attacks…”
    Získat plný text
    Konferenční příspěvek
  2. 2

    Protecting against address space layout randomisation (ASLR) compromises and return-to-libc attacks using network intrusion detection systems Autor Day, David J, Zhao, Zheng-Xu

    ISSN: 2153-182X, 2153-1838
    Vydáno: Beijing Springer Nature B.V 01.11.2011
    Vydáno v Machine intelligence research (Print) (01.11.2011)
    “…Writable XOR executable (W⊕X) and address space layout randomisation (ASLR) have elevated the understanding necessary to perpetrate buffer overflow exploits[1…”
    Získat plný text
    Journal Article
  3. 3

    DeepSanitizer: Combining Heuristic Rules and Deep Learning Models to Spot Silent Buffer Overflows in Binary Autor Wang, Zhilong, Cao, Chen, Yu, Li, Wang, Suhang, Sun, Xiaoyan, Liu, Peng

    ISSN: 1545-5971, 1941-0018
    Vydáno: IEEE 2025
    “…Memory sanitizer is a widely employed technique that serves as the frontline in the detection and analysis of memory corruption bugs, such as buffer overflows…”
    Získat plný text
    Journal Article
  4. 4

    Run-time optimisation of sewer remote control systems using genetic algorithms and multi-criteria decision analysis: CSO and energy consumption reduction Autor Bonamente, Emanuele, Termite, Loris Francesco, Garinei, Alberto, Menculini, Lorenzo, Marconi, Marcello, Piccioni, Emanuele, Biondi, Lorenzo, Rossi, Gianluca

    ISSN: 1028-6608, 1029-0249
    Vydáno: Basingstoke Taylor & Francis 02.04.2020
    “… A run-time multi-objective decision method was developed and applied to a case study with the aim of minimising water overflow and electric energy consumption of the upstream water collection system…”
    Získat plný text
    Journal Article
  5. 5

    On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer Overflows Autor Gisbert, Hector Marco, Ripoll, Ismael

    Vydáno: IEEE 01.08.2014
    “…) are techniques for defending systems against buffer overflow attacks but not limited to them. These mechanism are available in modern operating systems like Android, GNU/Linux and Windows…”
    Získat plný text
    Konferenční příspěvek
  6. 6

    A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques Autor Zhang, Xingnan, Huang, Jingjia, Feng, Yue

    Vydáno: IEEE 25.08.2023
    “…) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior…”
    Získat plný text
    Konferenční příspěvek
  7. 7

    Elevating Parallel Shadow Stack Concepts for Architectures with Register Windows Autor Lehniger, Kai, Langendorfer, Peter

    ISSN: 1545-5971, 1941-0018
    Vydáno: IEEE 2025
    “…Register windows are a processor feature that was originally developed to reduce the frequency for register spilling. This paper investigates how this…”
    Získat plný text
    Journal Article
  8. 8

    Surgically Returning to Randomized lib(c) Autor Roglia, G.F., Martignoni, L., Paleari, R., Bruschi, D.

    ISBN: 1424453275, 076953919X, 9780769539195, 9781424453276
    ISSN: 1063-9527
    Vydáno: IEEE 01.12.2009
    “… is based on the leakage of sensitive information about the memory layout of the process. Using our attack an attacker can exploit the majority of programs vulnerable to stack-based buffer overflows surgically, i.e…”
    Získat plný text
    Konferenční příspěvek
  9. 9

    An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques Autor Butt, Muhammad Arif, Ajmal, Zarafshan, Khan, Zafar Iqbal, Idrees, Muhammad, Javed, Yasir

    ISSN: 2076-3417, 2076-3417
    Vydáno: Basel MDPI AG 01.07.2022
    Vydáno v Applied sciences (01.07.2022)
    “…Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system…”
    Získat plný text
    Journal Article
  10. 10

    Buffer overflow vulnerabilities in CUDA: a preliminary analysis Autor Miele, Andrea

    ISSN: 2263-8733, 2263-8733
    Vydáno: Paris Springer Paris 01.05.2016
    “…We present a preliminary study of buffer overflow vulnerabilities in CUDA software running on GPUs…”
    Získat plný text
    Journal Article
  11. 11

    Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags Autor Gorter, Floris, Kroes, Taddeus, Bos, Herbert, Giuffrida, Cristiano

    ISSN: 2375-1207
    Vydáno: IEEE 19.05.2024
    “…Spatial memory errors such as buffer overflows still rank among the top vulnerabilities in C/C++ programs…”
    Získat plný text
    Konferenční příspěvek
  12. 12

    Exploiting stack-based buffer overflow using modern day techniques Autor Nicula, Ștefan, Zota, Răzvan Daniel

    ISSN: 1877-0509, 1877-0509
    Vydáno: Elsevier B.V 2019
    Vydáno v Procedia computer science (2019)
    “…One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow…”
    Získat plný text
    Journal Article
  13. 13

    Hardware Support for Low-Cost Memory Safety Autor Boivie, Rick, Saileshwar, Gururaj, Chen, Tong, Segal, Benjamin, Buyuktosunoglu, Alper

    Vydáno: IEEE 01.06.2021
    “…Programs written in C/C++ are vulnerable to memory-safety errors like buffer-overflows and use-after-free…”
    Získat plný text
    Konferenční příspěvek
  14. 14

    StackSpecter: Detecting Stack Buffer Overflows for the Xtensa Architecture Autor Lehniger, Kai, Langendorfer, Peter

    ISSN: 2474-154X
    Vydáno: IEEE 27.11.2024
    “…This paper presents a new approach, StackSpecter, for stack buffer overflow detection, specifically for architectures with register windows…”
    Získat plný text
    Konferenční příspěvek
  15. 15

    Crosschecking Distributed Data to Detect Integer Overflow Autor Zafra Saggioro, Luiz Felipe, Mendes Paisante, Vitor, Ernani Rodrigues, Raphel, Barbosa e Oliveira, Leonardo, Magno Quintao Pereira, Fernando

    ISSN: 1548-0992, 1548-0992
    Vydáno: Los Alamitos IEEE 01.04.2015
    Vydáno v Revista IEEE América Latina (01.04.2015)
    “… The integer range analysis is one strategy to detect integer overflow occurrences in programs…”
    Získat plný text
    Journal Article
  16. 16

    Revealing the exploitability of heap overflow through PoC analysis Autor Shen, Qintao, Meng, Guozhu, Chen, Kai

    ISSN: 2523-3246, 2523-3246
    Vydáno: Singapore Springer Nature Singapore 01.12.2024
    Vydáno v Cybersecurity (Singapore) (01.12.2024)
    “… However, the exploitable heap layout cannot fully demonstrate the exploitability of a vulnerability, as it is uncertain whether the attacker can control the data covered by the overflow…”
    Získat plný text
    Journal Article
  17. 17

    Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted ‘Internet of Healthcare Things’ network Autor Verma, Himanshu, Chauhan, Naveen, Chand, Narottam, Awasthi, Lalit Kumar

    ISSN: 0140-3664, 1873-703X
    Vydáno: Elsevier B.V 01.01.2022
    Vydáno v Computer communications (01.01.2022)
    “…, resulting in loss of critical medical information due to buffer loss and channel loss, which is unacceptable. In this paper, we explored different applications…”
    Získat plný text
    Journal Article
  18. 18

    Buffer Overflow Vulnerability Location in Binaries Based on Abnormal Execution Autor Gao, Tian, Guo, Xi

    Vydáno: IEEE 01.09.2020
    “…Buffer overflow is a very common and dangerous vulnerability. Now there are many methods and tools for this vulnerability, but it is difficult to locate it in binary code…”
    Získat plný text
    Konferenční příspěvek
  19. 19

    Enhancing in-process isolation for robust defense against information disclosure attacks Autor Jin, Hongjoo, Yang, Sumin, Cho, Haehyun, Lee, Dong Hoon

    ISSN: 0167-4048
    Vydáno: Elsevier Ltd 01.05.2025
    Vydáno v Computers & security (01.05.2025)
    “… To safeguard against these malicious attacks, researchers have developed various methods, such as Address Space Layout Randomization (ASLR…”
    Získat plný text
    Journal Article
  20. 20

    A Survey of Research on Runtime Rerandomization Under Memory Disclosure Autor Shen, Zhidong, Chen, Weiying

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 2019
    Vydáno v IEEE access (2019)
    “… As an important defense against attacks based on address space layout, code randomization technology effectively defends code-reuse attack by randomizing memory address space…”
    Získat plný text
    Journal Article