Buffer overflow and format string overflow vulnerabilities

KS Lhee, SJ Chapin - Software: practice and experience, 2003 - Wiley Online Library
Buffer overflow vulnerabilities are among the most widespread of security problems.
Numerous incidents of buffer overflow attacks have been reported and many solutions have …

{Type-Assisted} Dynamic Buffer Overflow Detection

K Lhee, SJ Chapin - … USENIX Security Symposium (USENIX Security 02 …, 2002 - usenix.org
Programs written in C are inherently vulnerable to buffer overflow attacks. Functions are
frequently passed pointers as parameters without any hint of their sizes. Since their sizes are …

TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection.

K Avijit, P Gupta, D Gupta - USENIX Security Symposium, 2004 - usenix.org
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather
than as first-class objects. Manipulation of arrays as pointers and primitive pointer arithmetic …

[PDF][PDF] A comparison of buffer overflow prevention implementations and weaknesses

P Silberman, R Johnson - IDEFENSE, August, 2004 - infocon.org
In the world of information security, buffer overflows remain the leading cause of software
vulnerabilities. In recent years, the industry has seen an elevated rate of exploitation of these …

[PDF][PDF] Testing C programs for buffer overflow vulnerabilities

ED Haugh, M Bishop - 2002 - elhacker.info
Security vulnerabilities often result from buffer overflows. A testing technique that
instruments programs with code that keeps track of memory buffers, and checks arguments …

A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)

M Rinard, C Cadar, D Dumitran… - 20th Annual Computer …, 2004 - ieeexplore.ieee.org
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to
cause the program to write beyond the bounds of an allocated memory block to corrupt other …

[PDF][PDF] A Practical Dynamic Buffer Overflow Detector.

O Ruwase, MS Lam - NDSS, 2004 - cs.cmu.edu
Despite previous efforts in auditing software manually and automatically, buffer overruns are
still being discovered in programs in use. A dynamic bounds checker detects buffer overruns …

[图书][B] Buffer overflow attacks

JC Foster, V Osipov, N Bhalla - 2005 - dl.acm.org
Will the Code You Write Today Headline Tomorrow's BugTraq Mail List? Includes Numbered-
by-Line Exploit Code Examples That Illustrate the Differences Between Stack Overflows …

Real-World Buffer Overflow Protection for Userspace and Kernelspace.

M Dalton, H Kannan, C Kozyrakis - USENIX Security Symposium, 2008 - usenix.org
Despite having been around for more than 25 years, buffer overflow attacks are still a major
security threat for deployed software. Existing techniques for buffer overflow detection …

Safestack: Automatically patching stack-based buffer overflow vulnerabilities

G Chen, H Jin, D Zou, BB Zhou, Z Liang… - … on Dependable and …, 2013 - ieeexplore.ieee.org
Buffer overflow attacks still pose a significant threat to the security and availability of today's
computer systems. Although there are a number of solutions proposed to provide adequate …