Techniques for Defending from Buffer Overflow Vulnerability Security Exploits

Recent reports reveal that majority of security violations are caused by weaknesses in code. Buffer overflow vulnerability is the most severe of security violations. Though wide range of solutions from static analysis techniques to hardware modifications were proposed to tackle the vulnerability the...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:IEEE internet computing s. 1
Hlavní autoři: Padmanabhuni, Bindu, Tan, Hee Beng Kuan
Médium: Journal Article
Jazyk:angličtina
Vydáno: IEEE 2019
Témata:
ISSN:1089-7801, 1941-0131
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Recent reports reveal that majority of security violations are caused by weaknesses in code. Buffer overflow vulnerability is the most severe of security violations. Though wide range of solutions from static analysis techniques to hardware modifications were proposed to tackle the vulnerability they either fail to address the large scope of the problem or have limitations preventing their use and adoption. In this article, we discuss well-known buffer overflow vulnerability exploit mechanisms followed by comprehensive study of proposals for defending from such exploits along with review of tools used for supporting the process.
ISSN:1089-7801
1941-0131
DOI:10.1109/MIC.2011.109