An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques
Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system. This vulnerability occurs primarily when someone attempts to write more bytes of data (shellcode) than a buffer can handle. To date, this primi...
Uložené v:
| Vydané v: | Applied sciences Ročník 12; číslo 13; s. 6702 |
|---|---|
| Hlavní autori: | , , , , |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Basel
MDPI AG
01.07.2022
|
| Predmet: | |
| ISSN: | 2076-3417, 2076-3417 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system. This vulnerability occurs primarily when someone attempts to write more bytes of data (shellcode) than a buffer can handle. To date, this primitive attack has been used to attack many different software systems, resulting in numerous buffer overflows. The most common type of buffer overflow is the stack overflow vulnerability, through which an adversary can gain admin privileges remotely, which can then be used to execute shellcode. Numerous mitigation techniques have been developed and deployed to reduce the likelihood of BOF attacks, but attackers still manage to bypass these techniques. A variety of mitigation techniques have been proposed and implemented on the hardware, operating system, and compiler levels. These techniques include No-EXecute (NX) and Address Space Layout Randomization (ASLR). The NX bit prevents the execution of malicious code by making various portions of the address space of a process inoperable. The ASLR algorithm randomly assigns addresses to various parts of the logical address space of a process as it is loaded in memory for execution. Position Independent Executable (PIE) and ASLR provide more robust protection by randomly generating binary segments. Read-only relocation (RELRO) protects the Global Offset Table (GOT) from overwriting attacks. StackGuard protects the stack by placing the canary before the return address in order to prevent stack smashing attacks. Despite all the mitigation techniques in place, hackers continue to be successful in bypassing them, making buffer overflow a persistent vulnerability. The current work aims to describe the stack-based buffer overflow vulnerability and review in detail the mitigation techniques reported in the literature as well as how hackers attempt to bypass them. |
|---|---|
| AbstractList | Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system. This vulnerability occurs primarily when someone attempts to write more bytes of data (shellcode) than a buffer can handle. To date, this primitive attack has been used to attack many different software systems, resulting in numerous buffer overflows. The most common type of buffer overflow is the stack overflow vulnerability, through which an adversary can gain admin privileges remotely, which can then be used to execute shellcode. Numerous mitigation techniques have been developed and deployed to reduce the likelihood of BOF attacks, but attackers still manage to bypass these techniques. A variety of mitigation techniques have been proposed and implemented on the hardware, operating system, and compiler levels. These techniques include No-EXecute (NX) and Address Space Layout Randomization (ASLR). The NX bit prevents the execution of malicious code by making various portions of the address space of a process inoperable. The ASLR algorithm randomly assigns addresses to various parts of the logical address space of a process as it is loaded in memory for execution. Position Independent Executable (PIE) and ASLR provide more robust protection by randomly generating binary segments. Read-only relocation (RELRO) protects the Global Offset Table (GOT) from overwriting attacks. StackGuard protects the stack by placing the canary before the return address in order to prevent stack smashing attacks. Despite all the mitigation techniques in place, hackers continue to be successful in bypassing them, making buffer overflow a persistent vulnerability. The current work aims to describe the stack-based buffer overflow vulnerability and review in detail the mitigation techniques reported in the literature as well as how hackers attempt to bypass them. |
| Author | Javed, Yasir Ajmal, Zarafshan Khan, Zafar Iqbal Idrees, Muhammad Butt, Muhammad Arif |
| Author_xml | – sequence: 1 givenname: Muhammad Arif orcidid: 0000-0002-7045-7618 surname: Butt fullname: Butt, Muhammad Arif – sequence: 2 givenname: Zarafshan orcidid: 0000-0002-0557-8966 surname: Ajmal fullname: Ajmal, Zarafshan – sequence: 3 givenname: Zafar Iqbal orcidid: 0000-0002-5079-2902 surname: Khan fullname: Khan, Zafar Iqbal – sequence: 4 givenname: Muhammad orcidid: 0000-0001-6411-5956 surname: Idrees fullname: Idrees, Muhammad – sequence: 5 givenname: Yasir orcidid: 0000-0002-6311-027X surname: Javed fullname: Javed, Yasir |
| BookMark | eNptkFFPwjAQxxuDiYg8-QWW-Gim7bVbt0dAVBIMD-Jz03UtlMx2dgPDt3eAMcZ4L3e5_O9_d79L1HPeaYSuCb6jNMf3sq4JEJpyDGeoD5inMWWE937VF2jYNBvcRU5oRnAfTUcumrn4QdftOnrdhp3eR95E430tm8a6VTTeGqNDtNjpYCr_Gb3Y1q5ka72Lllqtnf3Y6uYKnRtZNXr4nQfo7XG6nDzH88XTbDKax4pR3MYMlASZEFyWrKQJS2hheIJZkeuMKiilyiBlVGvCwBilEpUXxnCiDc5zDpoO0OzkW3q5EXWw7zLshZdWHBs-rIQMrVWVFkUJoBJqgGSYQQlFJhVgTHjCAHBGOq-bk1cd_OGHVmz8NrjufAFpluS8A5Z2qtuTSgXfNEGbn60EiwN28Qt7pyZ_1Mq2R1htkLb6d-YL8MKFKQ |
| CitedBy_id | crossref_primary_10_35784_jcsi_7389 crossref_primary_10_3390_electronics13173569 crossref_primary_10_1145_3641847 crossref_primary_10_1109_ACCESS_2025_3578602 crossref_primary_10_3390_s23208362 crossref_primary_10_1109_JIOT_2025_3587674 crossref_primary_10_1007_s11277_023_10431_2 crossref_primary_10_3390_electronics12234741 |
| Cites_doi | 10.3390/su10051652 10.1007/978-981-16-6309-3_51 10.1145/3517208.3523758 10.3850/9783981537079_0999 10.1016/j.cie.2020.107085 10.1109/ITRE.2003.1270612 10.1016/j.cose.2021.102510 10.1145/2660267.2660275 10.1007/978-3-642-04798-5_13 10.4186/ej.2011.15.2.31 10.3390/app9142928 10.1145/3477314.3507108 10.24138/jcomss-2021-0124 10.3390/s22051959 10.1016/j.bspc.2021.102726 10.1016/j.jpdc.2019.11.008 10.1016/j.scico.2022.102768 10.1109/TC.2006.59 10.1109/CDMA47397.2020.00021 10.1109/SP.2013.45 10.1145/3503222.3507779 10.1109/SP46214.2022.9833802 10.1145/2688500.2688501 10.1145/2382196.2382216 10.3390/su14031744 10.1016/j.procs.2016.04.015 10.1145/3524842.3528469 10.1145/2133375.2133377 10.1109/TDSC.2014.2345384 10.3390/risks10050091 10.1109/TC.2006.166 10.1145/948109.948146 10.1016/j.cose.2022.102781 10.1109/ACCESS.2020.2975037 10.1007/3-540-68671-1_5 10.1109/SAI.2017.8252186 |
| ContentType | Journal Article |
| Copyright | 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION ABUWG AFKRA AZQEC BENPR CCPQU DWQXO PHGZM PHGZT PIMPY PKEHL PQEST PQQKQ PQUKI PRINS DOA |
| DOI | 10.3390/app12136702 |
| DatabaseName | CrossRef ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials - QC ProQuest Central ProQuest One Community College ProQuest Central ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
| DatabaseTitleList | Publicly Available Content Database CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals (WRLC) url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Sciences (General) |
| EISSN | 2076-3417 |
| ExternalDocumentID | oai_doaj_org_article_bd22c53f218042d2b8ac200175422081 10_3390_app12136702 |
| GroupedDBID | .4S 2XV 5VS 7XC 8CJ 8FE 8FG 8FH AADQD AAFWJ AAYXX ADBBV ADMLS AFFHD AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS APEBS ARCSS BCNDV BENPR CCPQU CITATION CZ9 D1I D1J D1K GROUPED_DOAJ IAO IGS ITC K6- K6V KC. KQ8 L6V LK5 LK8 M7R MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PROAC TUS ABUWG AZQEC DWQXO PKEHL PQEST PQQKQ PQUKI PRINS |
| ID | FETCH-LOGICAL-c430t-42ca2a510dd4d35453bf7504b9e83c2dac82643ee142ffcc5c9bff71ef09972e3 |
| IEDL.DBID | BENPR |
| ISICitedReferencesCount | 15 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000824287000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2076-3417 |
| IngestDate | Tue Oct 14 18:33:59 EDT 2025 Mon Jun 30 07:42:50 EDT 2025 Sat Nov 29 07:10:14 EST 2025 Tue Nov 18 22:20:28 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 13 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c430t-42ca2a510dd4d35453bf7504b9e83c2dac82643ee142ffcc5c9bff71ef09972e3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-5079-2902 0000-0002-6311-027X 0000-0002-0557-8966 0000-0002-7045-7618 0000-0001-6411-5956 |
| OpenAccessLink | https://www.proquest.com/docview/2685973416?pq-origsite=%requestingapplication% |
| PQID | 2685973416 |
| PQPubID | 2032433 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_bd22c53f218042d2b8ac200175422081 proquest_journals_2685973416 crossref_primary_10_3390_app12136702 crossref_citationtrail_10_3390_app12136702 |
| PublicationCentury | 2000 |
| PublicationDate | 2022-07-01 |
| PublicationDateYYYYMMDD | 2022-07-01 |
| PublicationDate_xml | – month: 07 year: 2022 text: 2022-07-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Basel |
| PublicationPlace_xml | – name: Basel |
| PublicationTitle | Applied sciences |
| PublicationYear | 2022 |
| Publisher | MDPI AG |
| Publisher_xml | – name: MDPI AG |
| References | ref_50 ref_14 ref_13 ref_57 ref_12 ref_56 ref_11 ref_10 ref_54 ref_52 ref_51 ref_17 ref_16 Shao (ref_20) 2006; 55 Barker (ref_53) 2021; 153 Piromsopa (ref_18) 2011; 15 ref_25 ref_24 ref_23 ref_22 ref_21 ref_29 ref_28 ref_27 ref_26 Alzahrani (ref_55) 2021; 21 (ref_43) 2020; 137 Javed (ref_2) 2016; 82 Roemer (ref_32) 2012; 15 Alenezi (ref_1) 2016; 14 Yao (ref_6) 2022; 1 Xu (ref_31) 2022; 217 ref_35 ref_34 ref_33 ref_30 ref_39 ref_38 ref_37 Nugroho (ref_8) 2022; 18 Gupta (ref_40) 2014; 12 Jang (ref_41) 2022; 112 (ref_46) 2016; 1 ref_47 Jeong (ref_49) 2020; 8 ref_45 ref_44 Khan (ref_19) 2021; 1 ref_42 Dinger (ref_5) 2022; 17 ref_3 Ozdoganoglu (ref_15) 2006; 55 Alam (ref_36) 2021; 68 ref_48 ref_9 ref_4 ref_7 |
| References_xml | – ident: ref_50 doi: 10.3390/su10051652 – ident: ref_26 doi: 10.1007/978-981-16-6309-3_51 – ident: ref_29 doi: 10.1145/3517208.3523758 – ident: ref_22 doi: 10.3850/9783981537079_0999 – volume: 153 start-page: 107085 year: 2021 ident: ref_53 article-title: A decomposition approach for solving tri-level defender-attacker-defender problems publication-title: Comput. Ind. Eng. doi: 10.1016/j.cie.2020.107085 – volume: 14 start-page: 12 year: 2016 ident: ref_1 article-title: Developer companion: A framework to produce secure web applications publication-title: Int. J. Comput. Sci. Inf. Secur. – ident: ref_16 doi: 10.1109/ITRE.2003.1270612 – volume: 112 start-page: 102510 year: 2022 ident: ref_41 article-title: Badaslr: Exceptional cases of ASLR aiding exploitation publication-title: Comput. Secur. doi: 10.1016/j.cose.2021.102510 – volume: 1 start-page: 1 year: 2016 ident: ref_46 article-title: Exploiting Linux and PaX ASLR’s weaknesses on 32-and 64-bit systems publication-title: Blackhat Asia – ident: ref_14 doi: 10.1145/2660267.2660275 – ident: ref_23 – ident: ref_10 doi: 10.1007/978-3-642-04798-5_13 – volume: 21 start-page: 207 year: 2021 ident: ref_55 article-title: Buffer Overflow Attack and Defense Techniques publication-title: Int. J. Comput. Sci. Netw. Secur. – volume: 15 start-page: 31 year: 2011 ident: ref_18 article-title: Survey of protections from buffer-overflow attacks publication-title: Eng. J. doi: 10.4186/ej.2011.15.2.31 – volume: 1 start-page: 1 year: 2021 ident: ref_19 article-title: Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS) publication-title: J. Ambient. Intell. Humaniz. Comput. – ident: ref_42 doi: 10.3390/app9142928 – ident: ref_33 doi: 10.1145/3477314.3507108 – ident: ref_56 – ident: ref_52 – volume: 18 start-page: 165 year: 2022 ident: ref_8 article-title: A Study of Vulnerability Identifiers in Code Comments: Source, Purpose, and Severity publication-title: J. Commun. Softw. Syst. doi: 10.24138/jcomss-2021-0124 – ident: ref_13 doi: 10.3390/s22051959 – volume: 68 start-page: 102726 year: 2021 ident: ref_36 article-title: A novel framework for prognostic factors identification of malignant mesothelioma through association rule mining publication-title: Biomed. Signal Process. Control doi: 10.1016/j.bspc.2021.102726 – volume: 137 start-page: 77 year: 2020 ident: ref_43 article-title: KASLR-MT: Kernel address space layout randomization for multi-tenant cloud systems publication-title: J. Parallel Distrib. Comput. doi: 10.1016/j.jpdc.2019.11.008 – ident: ref_38 – volume: 1 start-page: 2 year: 2022 ident: ref_6 article-title: Being the Developers’ Friend: Our Experience Developing a High-Precision Tool for Secure Coding publication-title: IEEE Secur. Priv. – ident: ref_17 – ident: ref_45 – volume: 217 start-page: 102768 year: 2022 ident: ref_31 article-title: Defending against Return-Oriented Programming attacks based on return instruction using static analysis and binary patch techniques publication-title: Sci. Comput. Program. doi: 10.1016/j.scico.2022.102768 – volume: 55 start-page: 443 year: 2006 ident: ref_20 article-title: Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software publication-title: IEEE Trans. Comput. doi: 10.1109/TC.2006.59 – ident: ref_12 doi: 10.1109/CDMA47397.2020.00021 – ident: ref_28 – ident: ref_30 – ident: ref_44 doi: 10.1109/SP.2013.45 – ident: ref_27 doi: 10.1145/3503222.3507779 – ident: ref_7 doi: 10.1109/SP46214.2022.9833802 – ident: ref_24 – volume: 17 start-page: 1 year: 2022 ident: ref_5 article-title: The Strategic Problem of Information Security and Data Breaches publication-title: Coast. Bus. J. – ident: ref_11 doi: 10.1145/2688500.2688501 – ident: ref_47 – ident: ref_39 doi: 10.1145/2382196.2382216 – ident: ref_37 – ident: ref_21 – ident: ref_4 doi: 10.3390/su14031744 – volume: 82 start-page: 107 year: 2016 ident: ref_2 article-title: Defectiveness evolution in open source software systems publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2016.04.015 – ident: ref_9 doi: 10.1145/3524842.3528469 – ident: ref_25 – ident: ref_54 – volume: 15 start-page: 1 year: 2012 ident: ref_32 article-title: Return-oriented programming: Systems, languages, and applications publication-title: ACM Trans. Inf. Syst. Secur. doi: 10.1145/2133375.2133377 – volume: 12 start-page: 326 year: 2014 ident: ref_40 article-title: Marlin: Mitigating code reuse attacks using code randomization publication-title: IEEE Trans. Dependable Secur. Comput. doi: 10.1109/TDSC.2014.2345384 – ident: ref_3 doi: 10.3390/risks10050091 – volume: 55 start-page: 1271 year: 2006 ident: ref_15 article-title: SmashGuard: A hardware solution to prevent security attacks on the function return address publication-title: IEEE Trans. Comput. doi: 10.1109/TC.2006.166 – ident: ref_34 doi: 10.1145/948109.948146 – ident: ref_48 doi: 10.1016/j.cose.2022.102781 – volume: 8 start-page: 36267 year: 2020 ident: ref_49 article-title: A cfi countermeasure against got overwrite attacks publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2975037 – ident: ref_35 doi: 10.1007/3-540-68671-1_5 – ident: ref_57 – ident: ref_51 doi: 10.1109/SAI.2017.8252186 |
| SSID | ssj0000913810 |
| Score | 2.3099551 |
| Snippet | Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three decades, potentially compromising any software application or system.... |
| SourceID | doaj proquest crossref |
| SourceType | Open Website Aggregation Database Enrichment Source Index Database |
| StartPage | 6702 |
| SubjectTerms | buffer overflow attacks CVE Data integrity hardware based mitigation approaches Linux mitigation techniques Operating systems Programming languages Software |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LS8NAEF6keNCD2KpYrbKHHlQIJrubZnNstaKgVbBCbyHZBxZKWpq00n_v7GZbCgpePAXC5ME8duZLdr5BqJ3GTGoFSFUAVgaAEqQejxXzQhlB_lA8DX3bKPwcDQZ8NIrftkZ9mT1hFT1wpbjbTBIiQqohFYF_SZJxQyoIfhQyQnzbdA0HfwtM2TU4Dgx1VdWQRwHXm__Bhr2sE7kPKOsUZJn6fyzENrs8HKIDVxbibvU6dbSj8gba3yILbKC6C8MCXzmu6Osj1O_m-Cn37tWs_MTvi_lSrfBU495qBkUxXIZ7CzMABb-Cx-rJ9Au_jCtSjWmOh2v61uIYfTz0h3ePnpuM4AlG_dJjRKQkhXCSkkkKRRDNtOFpz2LFqSAyFYAaGFUqYERrIUIRZ1pHgdK2UVbRE1TLp7k6RdgXksMNQh6ojEUpixmTWcAzGvmpH4lOE92slZUIRxtupldMEoAPRrPJlmabqL0RnlVsGb-L9YzWNyKG4tqeAMMnzvDJX4ZvotbaZomLuyIhHQ4ICTJz5-w_nnGO9ohpd7Dbc1uoVs4X6gLtimU5LuaX1uW-ARzR10o priority: 102 providerName: Directory of Open Access Journals |
| Title | An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques |
| URI | https://www.proquest.com/docview/2685973416 https://doaj.org/article/bd22c53f218042d2b8ac200175422081 |
| Volume | 12 |
| WOSCitedRecordID | wos000824287000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals (WRLC) customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: DOA dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources (selected full-text only) customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: M~E dateStart: 20110101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: BENPR dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 2076-3417 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0000913810 issn: 2076-3417 databaseCode: PIMPY dateStart: 20110101 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT-MwEB5B4QAHXruI8pIPHNiVok1sp3FOiEIRSFAqYCX2FCV-ABJKStMW9d8zTp0uEogLxySTKPJ4xvONPd8AHKQxV0YjUpWIlRGgBKknYs29UEW4fmiRhn5VKHwZdbvi_j7uuYRb6Y5V1j6xctSqkDZH_oe2BMa-6HNbR_0Xz3aNsrurroXGPCxYpjLegIV2p9u7mWVZLOulCPxpYR5DfG_3hS2LWStyiZR6KaoY-z845GqVOVv97v-twYqLL8nxdEKsw5zON2D5HevgBqw7ey7JoSOd_vUDOsc5uci9U90fPpLb0WCsJ6QwpD3pY3SNr5H2yHZSIdc49c1z8UqunqbsHEVO7moe2PIn_D3r3J2ce67Fgic584cepzKlKdqlUlwxjKZYZizhexZrwSRVqUT4wZnWAafGSBnKODMmCrSpKm4124RGXuR6C4gvlcAPhCLQGY9SHnOuskBkLPJTP5KtJvyuRzuRjn_ctsF4ThCHWNUk71TThIOZcH9Ku_G5WNuqbSZiubKrG8XgIXGml2SKUhkyg8EMeihFM2FpKdEThZxSjIiasFtrNHEGXCb_1bn99eMdWKK2IqI6wbsLjeFgpPdgUY6HT-Vg383H_Qrq41Xv4qr37w0o8Osg |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1NT9wwEB1RqFQ4lI-Cui0UH0BqK0VNbGfjHCrEwiJWLAtqtxK3NPEHRULJstkF7Z_qb-w4cbZIrXrj0GtiW0r8_GbG9rwB2EtjrozGSFVirIwBSpB6ItbcC1WE9kOLNPSrROF-NBiIq6v4cgF-Nrkw9lplw4kVUatC2j3yT7Qt0PdFzm0fjO48WzXKnq42JTRqWJzp2QOGbOXn3jHO7z6lJ93h0annqgp4kjN_4nEqU5oiFJXiiqEDwTJjNc6zWAsmqUoletycaR1waoyUoYwzY6JAmyrJVDMc9xksccYjXFdLne7g8st8V8eqbIrArxMBGYt9ew5tVdPakdu4aUxfVSHgDwNQWbWT1f_tf6zBS-c_k8Ma8OuwoPMNWHmkqrgB646vSvLeiWp_eAXdw5z0cu9YjyY_yNfp-F7PSGFIZzbC6AG7kc7UVoohF7i0zW3xQM5vavWRIifDRue23IRvT_JxW7CYF7l-DcSXSuAAoQh0xqOUx5yrLBAZi_zUj2S7BR-b2U2k01e3ZT5uE4yzLBSSR1Bowd688aiWFfl7s46FybyJ1QKvHhTj68RRS5IpSmXIDDpryMCKZsLKbiLThpxS9PhasN0gKHEEVSa_4fPm36934cXp8Lyf9HuDs7ewTG32R3VbeRsWJ-Op3oHn8n5yU47fubVA4PtTw-0XXktGwA |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1NT9tAEB1RqCo4lEJBhI92D1RqK1nYu-t4fagQIUSNgDRSqURPrr0fgITsECeg_LX-us7a6xSpVW8cerXXlux982Zmd-cNwH4ac2U0ZqoSc2VMUILUE7HmXqgi9B9apKFfFQqfRYOBuLyMhwvws6mFsccqG06siFoV0q6RH9C2wNgXObd9YNyxiGG3dzi682wHKbvT2rTTqCFyqmcPmL6Vn_pdnOt3lPZOLo4_e67DgCc58ycepzKlKcJSKa4YBhMsM1bvPIu1YJKqVGL0zZnWAafGSBnKODMmCrSpCk41w_c-gyUMyTna2NKwfz78Pl_hsYqbIvDrokDGYt_uSVsFtXbkFnEaN1h1C_jDGVQerrf6P_-bV_DSxdXkqDaENVjQ-TqsPFJbXIc1x2Mlee_Etj-8hpOjnPRzr6tHk2vydTq-1zNSGNKZjTCrwMdIZ2o7yJAvaPLmtngg5ze1KkmRk4tG_7bcgG9P8nGbsJgXud4C4ksl8AWhCHTGo5THnKssEBmL_NSPZLsFH5uZTqTTXbftP24TzL8sLJJHsGjB_nzwqJYb-fuwjoXMfIjVCK8uFOOrxFFOkilKZcgMBnHIzIpmwspxIgOHnFKMBFuw26ApccRVJr-htP3v22_hBWIsOesPTndgmdqikOoQ8y4sTsZTvQfP5f3kphy_cWZB4MdTo-0XphhPsg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+In-Depth+Survey+of+Bypassing+Buffer+Overflow+Mitigation+Techniques&rft.jtitle=Applied+sciences&rft.au=Butt%2C+Muhammad+Arif&rft.au=Ajmal%2C+Zarafshan&rft.au=Khan%2C+Zafar+Iqbal&rft.au=Idrees%2C+Muhammad&rft.date=2022-07-01&rft.issn=2076-3417&rft.eissn=2076-3417&rft.volume=12&rft.issue=13&rft.spage=6702&rft_id=info:doi/10.3390%2Fapp12136702&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_app12136702 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2076-3417&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2076-3417&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2076-3417&client=summon |