S Alexander - The USENIX Magazine, 2005 - usenix.org
BUFFER OVERFLOW ATTACKS ARE THE most popular method intruders use to gain remote and privileged access to computer systems. Programs that fail to use appropriate …
M Dalton, H Kannan, C Kozyrakis - USENIX Security Symposium, 2008 - usenix.org
Despite having been around for more than 25 years, buffer overflow attacks are still a major security threat for deployed software. Existing techniques for buffer overflow detection …
G Chen, H Jin, D Zou, BB Zhou, Z Liang… - … on Dependable and …, 2013 - ieeexplore.ieee.org
Buffer overflow attacks still pose a significant threat to the security and availability of today's computer systems. Although there are a number of solutions proposed to provide adequate …
X Wang, CC Pan, P Liu, S Zhu - US Patent 8,443,442, 2013 - Google Patents
Throughout the history of cyber security, buffer over? ow is one of the most serious vulnerabilities in computer systems.(Note that according to this disclosure 'buffer'could be a …
Despite previous efforts in auditing software manually and automatically, buffer overruns are still being discovered in programs in use. A dynamic bounds checker detects buffer overruns …
A Baratloo, N Singh, T Tsai - 2000 USENIX Annual Technical …, 2000 - usenix.org
The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks. We present two new methods to detect and handle such attacks …
D Larochelle, D Evans - 10th USENIX Security Symposium (USENIX …, 2001 - usenix.org
Buffer overflow attacks may be today's single most important security threat. This paper presents a new approach to mitigating buffer overflow vulnerabilities by detecting likely …
Stack shielding technologies have been developed to protect programs against exploitation of stack based buffer overflows. Among different types of protections, we can separate two …
C Cowan, S Beattie, J Johansen, P Wagle - 12th USENIX Security …, 2003 - usenix.org
Despite numerous security technologies crafted to resist buffer overflow vulnerabilities, buffer overflows continue to be the dominant form of software security vulnerability. This is …