An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques

Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system. This vulnerability occurs primarily when someone attempts to write more bytes of data (shellcode) than a buffer can handle. To date, this primi...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Applied sciences Ročník 12; číslo 13; s. 6702
Hlavní autori: Butt, Muhammad Arif, Ajmal, Zarafshan, Khan, Zafar Iqbal, Idrees, Muhammad, Javed, Yasir
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Basel MDPI AG 01.07.2022
Predmet:
ISSN:2076-3417, 2076-3417
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system. This vulnerability occurs primarily when someone attempts to write more bytes of data (shellcode) than a buffer can handle. To date, this primitive attack has been used to attack many different software systems, resulting in numerous buffer overflows. The most common type of buffer overflow is the stack overflow vulnerability, through which an adversary can gain admin privileges remotely, which can then be used to execute shellcode. Numerous mitigation techniques have been developed and deployed to reduce the likelihood of BOF attacks, but attackers still manage to bypass these techniques. A variety of mitigation techniques have been proposed and implemented on the hardware, operating system, and compiler levels. These techniques include No-EXecute (NX) and Address Space Layout Randomization (ASLR). The NX bit prevents the execution of malicious code by making various portions of the address space of a process inoperable. The ASLR algorithm randomly assigns addresses to various parts of the logical address space of a process as it is loaded in memory for execution. Position Independent Executable (PIE) and ASLR provide more robust protection by randomly generating binary segments. Read-only relocation (RELRO) protects the Global Offset Table (GOT) from overwriting attacks. StackGuard protects the stack by placing the canary before the return address in order to prevent stack smashing attacks. Despite all the mitigation techniques in place, hackers continue to be successful in bypassing them, making buffer overflow a persistent vulnerability. The current work aims to describe the stack-based buffer overflow vulnerability and review in detail the mitigation techniques reported in the literature as well as how hackers attempt to bypass them.
AbstractList Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system. This vulnerability occurs primarily when someone attempts to write more bytes of data (shellcode) than a buffer can handle. To date, this primitive attack has been used to attack many different software systems, resulting in numerous buffer overflows. The most common type of buffer overflow is the stack overflow vulnerability, through which an adversary can gain admin privileges remotely, which can then be used to execute shellcode. Numerous mitigation techniques have been developed and deployed to reduce the likelihood of BOF attacks, but attackers still manage to bypass these techniques. A variety of mitigation techniques have been proposed and implemented on the hardware, operating system, and compiler levels. These techniques include No-EXecute (NX) and Address Space Layout Randomization (ASLR). The NX bit prevents the execution of malicious code by making various portions of the address space of a process inoperable. The ASLR algorithm randomly assigns addresses to various parts of the logical address space of a process as it is loaded in memory for execution. Position Independent Executable (PIE) and ASLR provide more robust protection by randomly generating binary segments. Read-only relocation (RELRO) protects the Global Offset Table (GOT) from overwriting attacks. StackGuard protects the stack by placing the canary before the return address in order to prevent stack smashing attacks. Despite all the mitigation techniques in place, hackers continue to be successful in bypassing them, making buffer overflow a persistent vulnerability. The current work aims to describe the stack-based buffer overflow vulnerability and review in detail the mitigation techniques reported in the literature as well as how hackers attempt to bypass them.
Author Javed, Yasir
Ajmal, Zarafshan
Khan, Zafar Iqbal
Idrees, Muhammad
Butt, Muhammad Arif
Author_xml – sequence: 1
  givenname: Muhammad Arif
  orcidid: 0000-0002-7045-7618
  surname: Butt
  fullname: Butt, Muhammad Arif
– sequence: 2
  givenname: Zarafshan
  orcidid: 0000-0002-0557-8966
  surname: Ajmal
  fullname: Ajmal, Zarafshan
– sequence: 3
  givenname: Zafar Iqbal
  orcidid: 0000-0002-5079-2902
  surname: Khan
  fullname: Khan, Zafar Iqbal
– sequence: 4
  givenname: Muhammad
  orcidid: 0000-0001-6411-5956
  surname: Idrees
  fullname: Idrees, Muhammad
– sequence: 5
  givenname: Yasir
  orcidid: 0000-0002-6311-027X
  surname: Javed
  fullname: Javed, Yasir
BookMark eNptkFFPwjAQxxuDiYg8-QWW-Gim7bVbt0dAVBIMD-Jz03UtlMx2dgPDt3eAMcZ4L3e5_O9_d79L1HPeaYSuCb6jNMf3sq4JEJpyDGeoD5inMWWE937VF2jYNBvcRU5oRnAfTUcumrn4QdftOnrdhp3eR95E430tm8a6VTTeGqNDtNjpYCr_Gb3Y1q5ka72Lllqtnf3Y6uYKnRtZNXr4nQfo7XG6nDzH88XTbDKax4pR3MYMlASZEFyWrKQJS2hheIJZkeuMKiilyiBlVGvCwBilEpUXxnCiDc5zDpoO0OzkW3q5EXWw7zLshZdWHBs-rIQMrVWVFkUJoBJqgGSYQQlFJhVgTHjCAHBGOq-bk1cd_OGHVmz8NrjufAFpluS8A5Z2qtuTSgXfNEGbn60EiwN28Qt7pyZ_1Mq2R1htkLb6d-YL8MKFKQ
CitedBy_id crossref_primary_10_35784_jcsi_7389
crossref_primary_10_3390_electronics13173569
crossref_primary_10_1145_3641847
crossref_primary_10_1109_ACCESS_2025_3578602
crossref_primary_10_3390_s23208362
crossref_primary_10_1109_JIOT_2025_3587674
crossref_primary_10_1007_s11277_023_10431_2
crossref_primary_10_3390_electronics12234741
Cites_doi 10.3390/su10051652
10.1007/978-981-16-6309-3_51
10.1145/3517208.3523758
10.3850/9783981537079_0999
10.1016/j.cie.2020.107085
10.1109/ITRE.2003.1270612
10.1016/j.cose.2021.102510
10.1145/2660267.2660275
10.1007/978-3-642-04798-5_13
10.4186/ej.2011.15.2.31
10.3390/app9142928
10.1145/3477314.3507108
10.24138/jcomss-2021-0124
10.3390/s22051959
10.1016/j.bspc.2021.102726
10.1016/j.jpdc.2019.11.008
10.1016/j.scico.2022.102768
10.1109/TC.2006.59
10.1109/CDMA47397.2020.00021
10.1109/SP.2013.45
10.1145/3503222.3507779
10.1109/SP46214.2022.9833802
10.1145/2688500.2688501
10.1145/2382196.2382216
10.3390/su14031744
10.1016/j.procs.2016.04.015
10.1145/3524842.3528469
10.1145/2133375.2133377
10.1109/TDSC.2014.2345384
10.3390/risks10050091
10.1109/TC.2006.166
10.1145/948109.948146
10.1016/j.cose.2022.102781
10.1109/ACCESS.2020.2975037
10.1007/3-540-68671-1_5
10.1109/SAI.2017.8252186
ContentType Journal Article
Copyright 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
ABUWG
AFKRA
AZQEC
BENPR
CCPQU
DWQXO
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
DOA
DOI 10.3390/app12136702
DatabaseName CrossRef
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials - QC
ProQuest Central
ProQuest One Community College
ProQuest Central
ProQuest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Publicly Available Content Database

CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals (WRLC)
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Sciences (General)
EISSN 2076-3417
ExternalDocumentID oai_doaj_org_article_bd22c53f218042d2b8ac200175422081
10_3390_app12136702
GroupedDBID .4S
2XV
5VS
7XC
8CJ
8FE
8FG
8FH
AADQD
AAFWJ
AAYXX
ADBBV
ADMLS
AFFHD
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
APEBS
ARCSS
BCNDV
BENPR
CCPQU
CITATION
CZ9
D1I
D1J
D1K
GROUPED_DOAJ
IAO
IGS
ITC
K6-
K6V
KC.
KQ8
L6V
LK5
LK8
M7R
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PROAC
TUS
ABUWG
AZQEC
DWQXO
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c430t-42ca2a510dd4d35453bf7504b9e83c2dac82643ee142ffcc5c9bff71ef09972e3
IEDL.DBID BENPR
ISICitedReferencesCount 15
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000824287000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2076-3417
IngestDate Tue Oct 14 18:33:59 EDT 2025
Mon Jun 30 07:42:50 EDT 2025
Sat Nov 29 07:10:14 EST 2025
Tue Nov 18 22:20:28 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 13
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c430t-42ca2a510dd4d35453bf7504b9e83c2dac82643ee142ffcc5c9bff71ef09972e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-5079-2902
0000-0002-6311-027X
0000-0002-0557-8966
0000-0002-7045-7618
0000-0001-6411-5956
OpenAccessLink https://www.proquest.com/docview/2685973416?pq-origsite=%requestingapplication%
PQID 2685973416
PQPubID 2032433
ParticipantIDs doaj_primary_oai_doaj_org_article_bd22c53f218042d2b8ac200175422081
proquest_journals_2685973416
crossref_primary_10_3390_app12136702
crossref_citationtrail_10_3390_app12136702
PublicationCentury 2000
PublicationDate 2022-07-01
PublicationDateYYYYMMDD 2022-07-01
PublicationDate_xml – month: 07
  year: 2022
  text: 2022-07-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Applied sciences
PublicationYear 2022
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References ref_50
ref_14
ref_13
ref_57
ref_12
ref_56
ref_11
ref_10
ref_54
ref_52
ref_51
ref_17
ref_16
Shao (ref_20) 2006; 55
Barker (ref_53) 2021; 153
Piromsopa (ref_18) 2011; 15
ref_25
ref_24
ref_23
ref_22
ref_21
ref_29
ref_28
ref_27
ref_26
Alzahrani (ref_55) 2021; 21
(ref_43) 2020; 137
Javed (ref_2) 2016; 82
Roemer (ref_32) 2012; 15
Alenezi (ref_1) 2016; 14
Yao (ref_6) 2022; 1
Xu (ref_31) 2022; 217
ref_35
ref_34
ref_33
ref_30
ref_39
ref_38
ref_37
Nugroho (ref_8) 2022; 18
Gupta (ref_40) 2014; 12
Jang (ref_41) 2022; 112
(ref_46) 2016; 1
ref_47
Jeong (ref_49) 2020; 8
ref_45
ref_44
Khan (ref_19) 2021; 1
ref_42
Dinger (ref_5) 2022; 17
ref_3
Ozdoganoglu (ref_15) 2006; 55
Alam (ref_36) 2021; 68
ref_48
ref_9
ref_4
ref_7
References_xml – ident: ref_50
  doi: 10.3390/su10051652
– ident: ref_26
  doi: 10.1007/978-981-16-6309-3_51
– ident: ref_29
  doi: 10.1145/3517208.3523758
– ident: ref_22
  doi: 10.3850/9783981537079_0999
– volume: 153
  start-page: 107085
  year: 2021
  ident: ref_53
  article-title: A decomposition approach for solving tri-level defender-attacker-defender problems
  publication-title: Comput. Ind. Eng.
  doi: 10.1016/j.cie.2020.107085
– volume: 14
  start-page: 12
  year: 2016
  ident: ref_1
  article-title: Developer companion: A framework to produce secure web applications
  publication-title: Int. J. Comput. Sci. Inf. Secur.
– ident: ref_16
  doi: 10.1109/ITRE.2003.1270612
– volume: 112
  start-page: 102510
  year: 2022
  ident: ref_41
  article-title: Badaslr: Exceptional cases of ASLR aiding exploitation
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2021.102510
– volume: 1
  start-page: 1
  year: 2016
  ident: ref_46
  article-title: Exploiting Linux and PaX ASLR’s weaknesses on 32-and 64-bit systems
  publication-title: Blackhat Asia
– ident: ref_14
  doi: 10.1145/2660267.2660275
– ident: ref_23
– ident: ref_10
  doi: 10.1007/978-3-642-04798-5_13
– volume: 21
  start-page: 207
  year: 2021
  ident: ref_55
  article-title: Buffer Overflow Attack and Defense Techniques
  publication-title: Int. J. Comput. Sci. Netw. Secur.
– volume: 15
  start-page: 31
  year: 2011
  ident: ref_18
  article-title: Survey of protections from buffer-overflow attacks
  publication-title: Eng. J.
  doi: 10.4186/ej.2011.15.2.31
– volume: 1
  start-page: 1
  year: 2021
  ident: ref_19
  article-title: Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS)
  publication-title: J. Ambient. Intell. Humaniz. Comput.
– ident: ref_42
  doi: 10.3390/app9142928
– ident: ref_33
  doi: 10.1145/3477314.3507108
– ident: ref_56
– ident: ref_52
– volume: 18
  start-page: 165
  year: 2022
  ident: ref_8
  article-title: A Study of Vulnerability Identifiers in Code Comments: Source, Purpose, and Severity
  publication-title: J. Commun. Softw. Syst.
  doi: 10.24138/jcomss-2021-0124
– ident: ref_13
  doi: 10.3390/s22051959
– volume: 68
  start-page: 102726
  year: 2021
  ident: ref_36
  article-title: A novel framework for prognostic factors identification of malignant mesothelioma through association rule mining
  publication-title: Biomed. Signal Process. Control
  doi: 10.1016/j.bspc.2021.102726
– volume: 137
  start-page: 77
  year: 2020
  ident: ref_43
  article-title: KASLR-MT: Kernel address space layout randomization for multi-tenant cloud systems
  publication-title: J. Parallel Distrib. Comput.
  doi: 10.1016/j.jpdc.2019.11.008
– ident: ref_38
– volume: 1
  start-page: 2
  year: 2022
  ident: ref_6
  article-title: Being the Developers’ Friend: Our Experience Developing a High-Precision Tool for Secure Coding
  publication-title: IEEE Secur. Priv.
– ident: ref_17
– ident: ref_45
– volume: 217
  start-page: 102768
  year: 2022
  ident: ref_31
  article-title: Defending against Return-Oriented Programming attacks based on return instruction using static analysis and binary patch techniques
  publication-title: Sci. Comput. Program.
  doi: 10.1016/j.scico.2022.102768
– volume: 55
  start-page: 443
  year: 2006
  ident: ref_20
  article-title: Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2006.59
– ident: ref_12
  doi: 10.1109/CDMA47397.2020.00021
– ident: ref_28
– ident: ref_30
– ident: ref_44
  doi: 10.1109/SP.2013.45
– ident: ref_27
  doi: 10.1145/3503222.3507779
– ident: ref_7
  doi: 10.1109/SP46214.2022.9833802
– ident: ref_24
– volume: 17
  start-page: 1
  year: 2022
  ident: ref_5
  article-title: The Strategic Problem of Information Security and Data Breaches
  publication-title: Coast. Bus. J.
– ident: ref_11
  doi: 10.1145/2688500.2688501
– ident: ref_47
– ident: ref_39
  doi: 10.1145/2382196.2382216
– ident: ref_37
– ident: ref_21
– ident: ref_4
  doi: 10.3390/su14031744
– volume: 82
  start-page: 107
  year: 2016
  ident: ref_2
  article-title: Defectiveness evolution in open source software systems
  publication-title: Procedia Comput. Sci.
  doi: 10.1016/j.procs.2016.04.015
– ident: ref_9
  doi: 10.1145/3524842.3528469
– ident: ref_25
– ident: ref_54
– volume: 15
  start-page: 1
  year: 2012
  ident: ref_32
  article-title: Return-oriented programming: Systems, languages, and applications
  publication-title: ACM Trans. Inf. Syst. Secur.
  doi: 10.1145/2133375.2133377
– volume: 12
  start-page: 326
  year: 2014
  ident: ref_40
  article-title: Marlin: Mitigating code reuse attacks using code randomization
  publication-title: IEEE Trans. Dependable Secur. Comput.
  doi: 10.1109/TDSC.2014.2345384
– ident: ref_3
  doi: 10.3390/risks10050091
– volume: 55
  start-page: 1271
  year: 2006
  ident: ref_15
  article-title: SmashGuard: A hardware solution to prevent security attacks on the function return address
  publication-title: IEEE Trans. Comput.
  doi: 10.1109/TC.2006.166
– ident: ref_34
  doi: 10.1145/948109.948146
– ident: ref_48
  doi: 10.1016/j.cose.2022.102781
– volume: 8
  start-page: 36267
  year: 2020
  ident: ref_49
  article-title: A cfi countermeasure against got overwrite attacks
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2975037
– ident: ref_35
  doi: 10.1007/3-540-68671-1_5
– ident: ref_57
– ident: ref_51
  doi: 10.1109/SAI.2017.8252186
SSID ssj0000913810
Score 2.3099551
Snippet Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system....
SourceID doaj
proquest
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
StartPage 6702
SubjectTerms buffer overflow attacks
CVE
Data integrity
hardware based mitigation approaches
Linux
mitigation techniques
Operating systems
Programming languages
Software
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF6keNCD2KpYrbKHHlQIJrubZnNstaKgVbBCbyHZBxZKWpq00n_v7GZbCgpePAXC5ME8duZLdr5BqJ3GTGoFSFUAVgaAEqQejxXzQhlB_lA8DX3bKPwcDQZ8NIrftkZ9mT1hFT1wpbjbTBIiQqohFYF_SZJxQyoIfhQyQnzbdA0HfwtM2TU4Dgx1VdWQRwHXm__Bhr2sE7kPKOsUZJn6fyzENrs8HKIDVxbibvU6dbSj8gba3yILbKC6C8MCXzmu6Osj1O_m-Cn37tWs_MTvi_lSrfBU495qBkUxXIZ7CzMABb-Cx-rJ9Au_jCtSjWmOh2v61uIYfTz0h3ePnpuM4AlG_dJjRKQkhXCSkkkKRRDNtOFpz2LFqSAyFYAaGFUqYERrIUIRZ1pHgdK2UVbRE1TLp7k6RdgXksMNQh6ojEUpixmTWcAzGvmpH4lOE92slZUIRxtupldMEoAPRrPJlmabqL0RnlVsGb-L9YzWNyKG4tqeAMMnzvDJX4ZvotbaZomLuyIhHQ4ICTJz5-w_nnGO9ohpd7Dbc1uoVs4X6gLtimU5LuaX1uW-ARzR10o
  priority: 102
  providerName: Directory of Open Access Journals
Title An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques
URI https://www.proquest.com/docview/2685973416
https://doaj.org/article/bd22c53f218042d2b8ac200175422081
Volume 12
WOSCitedRecordID wos000824287000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals (WRLC)
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: DOA
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources (selected full-text only)
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: M~E
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: BENPR
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 2076-3417
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000913810
  issn: 2076-3417
  databaseCode: PIMPY
  dateStart: 20110101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT-MwEB5B4QAHXruI8pIPHNiVok1sp3FOiEIRSFAqYCX2FCV-ABJKStMW9d8zTp0uEogLxySTKPJ4xvONPd8AHKQxV0YjUpWIlRGgBKknYs29UEW4fmiRhn5VKHwZdbvi_j7uuYRb6Y5V1j6xctSqkDZH_oe2BMa-6HNbR_0Xz3aNsrurroXGPCxYpjLegIV2p9u7mWVZLOulCPxpYR5DfG_3hS2LWStyiZR6KaoY-z845GqVOVv97v-twYqLL8nxdEKsw5zON2D5HevgBqw7ey7JoSOd_vUDOsc5uci9U90fPpLb0WCsJ6QwpD3pY3SNr5H2yHZSIdc49c1z8UqunqbsHEVO7moe2PIn_D3r3J2ce67Fgic584cepzKlKdqlUlwxjKZYZizhexZrwSRVqUT4wZnWAafGSBnKODMmCrSpKm4124RGXuR6C4gvlcAPhCLQGY9SHnOuskBkLPJTP5KtJvyuRzuRjn_ctsF4ThCHWNUk71TThIOZcH9Ku_G5WNuqbSZiubKrG8XgIXGml2SKUhkyg8EMeihFM2FpKdEThZxSjIiasFtrNHEGXCb_1bn99eMdWKK2IqI6wbsLjeFgpPdgUY6HT-Vg383H_Qrq41Xv4qr37w0o8Osg
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1NT9wwEB1RqFQ4lI-Cui0UH0BqK0VNbGfjHCrEwiJWLAtqtxK3NPEHRULJstkF7Z_qb-w4cbZIrXrj0GtiW0r8_GbG9rwB2EtjrozGSFVirIwBSpB6ItbcC1WE9kOLNPSrROF-NBiIq6v4cgF-Nrkw9lplw4kVUatC2j3yT7Qt0PdFzm0fjO48WzXKnq42JTRqWJzp2QOGbOXn3jHO7z6lJ93h0annqgp4kjN_4nEqU5oiFJXiiqEDwTJjNc6zWAsmqUoletycaR1waoyUoYwzY6JAmyrJVDMc9xksccYjXFdLne7g8st8V8eqbIrArxMBGYt9ew5tVdPakdu4aUxfVSHgDwNQWbWT1f_tf6zBS-c_k8Ma8OuwoPMNWHmkqrgB646vSvLeiWp_eAXdw5z0cu9YjyY_yNfp-F7PSGFIZzbC6AG7kc7UVoohF7i0zW3xQM5vavWRIifDRue23IRvT_JxW7CYF7l-DcSXSuAAoQh0xqOUx5yrLBAZi_zUj2S7BR-b2U2k01e3ZT5uE4yzLBSSR1Bowd688aiWFfl7s46FybyJ1QKvHhTj68RRS5IpSmXIDDpryMCKZsLKbiLThpxS9PhasN0gKHEEVSa_4fPm36934cXp8Lyf9HuDs7ewTG32R3VbeRsWJ-Op3oHn8n5yU47fubVA4PtTw-0XXktGwA
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1NT9tAEB1RqCo4lEJBhI92D1RqK1nYu-t4fagQIUSNgDRSqURPrr0fgITsECeg_LX-us7a6xSpVW8cerXXlux982Zmd-cNwH4ac2U0ZqoSc2VMUILUE7HmXqgi9B9apKFfFQqfRYOBuLyMhwvws6mFsccqG06siFoV0q6RH9C2wNgXObd9YNyxiGG3dzi682wHKbvT2rTTqCFyqmcPmL6Vn_pdnOt3lPZOLo4_e67DgCc58ycepzKlKcJSKa4YBhMsM1bvPIu1YJKqVGL0zZnWAafGSBnKODMmCrSpCk41w_c-gyUMyTna2NKwfz78Pl_hsYqbIvDrokDGYt_uSVsFtXbkFnEaN1h1C_jDGVQerrf6P_-bV_DSxdXkqDaENVjQ-TqsPFJbXIc1x2Mlee_Etj-8hpOjnPRzr6tHk2vydTq-1zNSGNKZjTCrwMdIZ2o7yJAvaPLmtngg5ze1KkmRk4tG_7bcgG9P8nGbsJgXud4C4ksl8AWhCHTGo5THnKssEBmL_NSPZLsFH5uZTqTTXbftP24TzL8sLJJHsGjB_nzwqJYb-fuwjoXMfIjVCK8uFOOrxFFOkilKZcgMBnHIzIpmwspxIgOHnFKMBFuw26ApccRVJr-htP3v22_hBWIsOesPTndgmdqikOoQ8y4sTsZTvQfP5f3kphy_cWZB4MdTo-0XphhPsg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+In-Depth+Survey+of+Bypassing+Buffer+Overflow+Mitigation+Techniques&rft.jtitle=Applied+sciences&rft.au=Butt%2C+Muhammad+Arif&rft.au=Ajmal%2C+Zarafshan&rft.au=Khan%2C+Zafar+Iqbal&rft.au=Idrees%2C+Muhammad&rft.date=2022-07-01&rft.issn=2076-3417&rft.eissn=2076-3417&rft.volume=12&rft.issue=13&rft.spage=6702&rft_id=info:doi/10.3390%2Fapp12136702&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_app12136702
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon