Výsledky vyhledávání - stack buffer overflow attack
-
1
RS-Stack: Defense against Stack Buffer Overflow Attack with Random Shadow Stack
Vydáno: IEEE 28.10.2022Vydáno v 2022 IEEE 2nd International Conference on Data Science and Computer Application (ICDSCA) (28.10.2022)“…Shadow stack is a method to prevent stack buffer overflow attack. However, in the existing shadow stack solutions, it is often supposed that the shadow stack is safe, but the reality is not always the case…”
Získat plný text
Konferenční příspěvek -
2
Prevention Method for Stack Buffer Overflow Attack in TA Command Calls in OP-TEE
ISSN: 2832-1324Vydáno: IEEE 27.11.2023Vydáno v International Symposium on Computing and Networking Workshops (Online) (27.11.2023)“… We also propose a method for preventing attacks that exploit stack buffer overflows in TA command calls…”
Získat plný text
Konferenční příspěvek -
3
Zero-Day Hardware-Supported Malware Detection of Stack Buffer Overflow Attacks: An Application Exploiting the CV32e40p RISC-V Core
Vydáno: IEEE 11.03.2025Vydáno v 2025 IEEE 26th Latin American Test Symposium (LATS) (11.03.2025)“…The RISC-V architecture has become increasingly popular due to its open-source nature and flexibility, making it susceptible to various security attacks, such as Stack Buffer Overflow (SBO) attacks…”
Získat plný text
Konferenční příspěvek -
4
HardStack: Prevent Stack Buffer Overflow Attack with LBR
Vydáno: IEEE 01.12.2019Vydáno v 2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS) (01.12.2019)“…Stack buffer overflow attack can temper with software control flow by continuously injecting data into stack and overwriting function return address…”
Získat plný text
Konferenční příspěvek -
5
Microarchitectural Protection Against Stack-Based Buffer Overflow Attacks
ISSN: 0272-1732, 1937-4143Vydáno: Los Alamitos IEEE 01.07.2006Vydáno v IEEE MICRO (01.07.2006)“… A microarchitecture-based, software-transparent mechanism offers protection against stack-based buffer overflow attacks with moderate hardware cost and negligible performance…”
Získat plný text
Journal Article -
6
Nile: A Programmable Monitoring Coprocessor
ISSN: 1556-6056, 1556-6064Vydáno: New York IEEE 01.01.2018Vydáno v IEEE computer architecture letters (01.01.2018)“…Researchers widely employ hardware performance counters (HPCs) as well as debugging and profiling tools in processors for monitoring different events such as…”
Získat plný text
Journal Article -
7
Hardware-based stack buffer overflow attack detection on RISC-V architectures
ISSN: 2331-8422Vydáno: Ithaca Cornell University Library, arXiv.org 12.06.2024Vydáno v arXiv.org (12.06.2024)“…This work evaluates how well hardware-based approaches detect stack buffer overflow (SBO…”
Získat plný text
Paper -
8
ShadowStack: A new approach for secure program execution
ISSN: 0026-2714Vydáno: 01.08.2015Vydáno v Microelectronics and reliability (01.08.2015)Získat plný text
Journal Article -
9
An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks
Vydáno: IEEE 01.12.2018Vydáno v 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) (01.12.2018)“… With such overhead, the defender can use software-only approaches only to the debugging context. In this paper, we present a novel hardware approach to detect stack based buffer overflow attack during runtime…”
Získat plný text
Konferenční příspěvek -
10
Secure Patrol: Patrolling Against Buffer Overflow Exploits
ISSN: 1939-3555, 1939-3547Vydáno: Philadelphia, PA Taylor & Francis 04.05.2014Vydáno v Information security journal. (04.05.2014)“…Buffer overflow attacks are caused due to exploitation of stack or heap in computer memory…”
Získat plný text
Journal Article -
11
Massachusetts Inventor Develops Stack Buffer Overflow Attack Preventing Method
Vydáno: Washington, D.C HT Digital Streams Limited 03.08.2006Vydáno v US Fed News Service, Including US State News (03.08.2006)Získat plný text
Newsletter -
12
To Detect Stack Buffer Overflow with Polymorphic Canaries
ISSN: 2158-3927Vydáno: IEEE 01.06.2018Vydáno v Proceedings - International Conference on Dependable Systems and Networks (01.06.2018)“…Stack Smashing Protection (SSP) is a simple and highly efficient technique widely used in practice as the front line defense against stack buffer overflow attacks…”
Získat plný text
Konferenční příspěvek -
13
A Fine-Grained Control Flow Integrity Approach Against Runtime Memory Attacks for Embedded Systems
ISSN: 1063-8210, 1557-9999Vydáno: New York IEEE 01.11.2016Vydáno v IEEE transactions on very large scale integration (VLSI) systems (01.11.2016)“…Runtime attacks on memory, such as buffer overflow based stack smashing and code reuse attacks, are common in embedded systems…”
Získat plný text
Journal Article -
14
Guided Learning and Interactive Visualization for Teaching & Learning Stack Smashing Attacks & Defenses: Experiences and Evaluation
ISSN: 2377-634XVydáno: IEEE 13.10.2024Vydáno v Proceedings - Frontiers in Education Conference (13.10.2024)“… Widely ubiquitous buffer overflow vul-nerabilities and stack smashing attacks that exploit them are critical components in advanced software security curricula, since buffer overflows can arise due…”
Získat plný text
Konferenční příspěvek -
15
Preventing buffer overflow attacks using Binary of Split Stack (BoSS)
ISBN: 0549352244, 9780549352242Vydáno: ProQuest Dissertations & Theses 01.01.2007“… Key idea in buffer overflow attack is to overrun any buffer stored on the local stack and overwrite the control flow information like return address of the current function…”
Získat plný text
Dissertation -
16
Variable Record Table: A Run-time Solution for Mitigating Buffer Overflow Attack
ISSN: 1558-3899Vydáno: IEEE 01.08.2019Vydáno v Conference proceedings : Midwest Symposium on Circuits and Systems (01.08.2019)“…We present a novel approach to mitigate buffer overflow attack using Variable Record Table (VRT…”
Získat plný text
Konferenční příspěvek -
17
Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems
ISSN: 1877-0509, 1877-0509Vydáno: Elsevier B.V 2016Vydáno v Procedia computer science (2016)“…We address the particular cyber attack technique known as stack buffer overflow in GNU/Linux operating systems, which are widely used in HPC environments…”
Získat plný text
Journal Article -
18
SSPFA: effective stack smashing protection for Android OS
ISSN: 1615-5262, 1615-5270Vydáno: Berlin/Heidelberg Springer Berlin Heidelberg 01.08.2019Vydáno v International journal of information security (01.08.2019)“…In this paper, we detail why the stack smashing protector (SSP), one of the most effective techniques to mitigate stack buffer overflow attacks, fails…”
Získat plný text
Journal Article -
19
A New Class of Buffer Overflow Attacks
ISBN: 1612843840, 9781612843841ISSN: 1063-6927Vydáno: IEEE 01.06.2011Vydáno v 2011 31st International Conference on Distributed Computing Systems (01.06.2011)“… Such overflows can lead to stack as well as heap/data/bss overflows, which can be exploited by attackers in order to carry out the entire range of attacks associated with buffer overflow…”
Získat plný text
Konferenční příspěvek -
20
RISC-V Based Secure Processor Architecture for Return Address Protection
ISSN: 2380-6923Vydáno: IEEE 04.01.2025Vydáno v VLSI design (04.01.2025)“… Buffer over-flow (BFO) attacks, specifically on Stack, can alter the program execution flow and are extensively employed by attackers…”
Získat plný text
Konferenční příspěvek

