[PDF][PDF] Detection and prevention of stack buffer overflow attacks

BA Kuperman, CE Brodley, H Ozdoganoglu… - Communications of the …, 2005 - dl.acm.org
Detection and prevention of stack buffer overflow attacks Page 1 50 November 2005/Vol. 48,
No. 11 COMMUNICATIONS OF THE ACM Page 2 COMMUNICATIONS OF THE ACM …

[PDF][PDF] Defeating compiler-level buffer overflow protection

S Alexander - The USENIX Magazine, 2005 - usenix.org
BUFFER OVERFLOW ATTACKS ARE THE most popular method intruders use to gain
remote and privileged access to computer systems. Programs that fail to use appropriate …

Real-World Buffer Overflow Protection for Userspace and Kernelspace.

M Dalton, H Kannan, C Kozyrakis - USENIX Security Symposium, 2008 - usenix.org
Despite having been around for more than 25 years, buffer overflow attacks are still a major
security threat for deployed software. Existing techniques for buffer overflow detection …

Safestack: Automatically patching stack-based buffer overflow vulnerabilities

G Chen, H Jin, D Zou, BB Zhou, Z Liang… - … on Dependable and …, 2013 - ieeexplore.ieee.org
Buffer overflow attacks still pose a significant threat to the security and availability of today's
computer systems. Although there are a number of solutions proposed to provide adequate …

Signature-free buffer overflow attack blocker

X Wang, CC Pan, P Liu, S Zhu - US Patent 8,443,442, 2013 - Google Patents
Throughout the history of cyber security, buffer over? ow is one of the most serious
vulnerabilities in computer systems.(Note that according to this disclosure 'buffer'could be a …

[PDF][PDF] A Practical Dynamic Buffer Overflow Detector.

O Ruwase, MS Lam - NDSS, 2004 - cs.cmu.edu
Despite previous efforts in auditing software manually and automatically, buffer overruns are
still being discovered in programs in use. A dynamic bounds checker detects buffer overruns …

Transparent {Run-Time} defense against {Stack-Smashing} attacks

A Baratloo, N Singh, T Tsai - 2000 USENIX Annual Technical …, 2000 - usenix.org
The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant
portion of security attacks. We present two new methods to detect and handle such attacks …

Statically detecting likely buffer overflow vulnerabilities

D Larochelle, D Evans - 10th USENIX Security Symposium (USENIX …, 2001 - usenix.org
Buffer overflow attacks may be today's single most important security threat. This paper
presents a new approach to mitigating buffer overflow vulnerabilities by detecting likely …

[PDF][PDF] Four different tricks to bypass stackshield and stackguard protection

G Richarte - World Wide Web, 2002 - cs.purdue.edu
Stack shielding technologies have been developed to protect programs against exploitation
of stack based buffer overflows. Among different types of protections, we can separate two …

{PointGuard™}: Protecting Pointers from Buffer Overflow Vulnerabilities

C Cowan, S Beattie, J Johansen, P Wagle - 12th USENIX Security …, 2003 - usenix.org
Despite numerous security technologies crafted to resist buffer overflow vulnerabilities,
buffer overflows continue to be the dominant form of software security vulnerability. This is …