[PDF][PDF] Four different tricks to bypass stackshield and stackguard protection

G Richarte - World Wide Web, 2002 - cs.purdue.edu
Stack shielding technologies have been developed to protect programs against exploitation
of stack based buffer overflows. Among different types of protections, we can separate two …

[PDF][PDF] Detection and prevention of stack buffer overflow attacks

BA Kuperman, CE Brodley, H Ozdoganoglu… - Communications of the …, 2005 - dl.acm.org
Detection and prevention of stack buffer overflow attacks Page 1 50 November 2005/Vol. 48,
No. 11 COMMUNICATIONS OF THE ACM Page 2 COMMUNICATIONS OF THE ACM …

[HTML][HTML] {PointGuard™}: Protecting Pointers from Buffer Overflow Vulnerabilities

C Cowan, S Beattie, J Johansen, P Wagle - 12th USENIX Security …, 2003 - usenix.org
Despite numerous security technologies crafted to resist buffer overflow vulnerabilities,
buffer overflows continue to be the dominant form of software security vulnerability. This is …

[PDF][PDF] Stackguard: Simple stack smash protection for gcc

P Wagle, C Cowan - Proceedings of the GCC Developers Summit, 2003 - idsa.prd.fr
Since 1998, StackGuard patches to GCC have been used to protect entire distributions from
stack smashing buffer overflows. Performance overhead and software compatibility issues …

[PDF][PDF] Defeating the stack based buffer overflow prevention mechanism of microsoft windows 2003 server

D Litchfield - 2003 - Citeseer
This paper presents several methods of bypassing the protection mechanism built into
Microsoft's Windows 2003 Server that attempts to prevent the exploitation of stack based …

[HTML][HTML] Real-World Buffer Overflow Protection for Userspace and Kernelspace.

M Dalton, H Kannan, C Kozyrakis - USENIX Security Symposium, 2008 - usenix.org
Despite having been around for more than 25 years, buffer overflow attacks are still a major
security threat for deployed software. Existing techniques for buffer overflow detection …

[HTML][HTML] An in-depth survey of bypassing buffer overflow mitigation techniques

MA Butt, Z Ajmal, ZI Khan, M Idrees, Y Javed - Applied Sciences, 2022 - mdpi.com
Buffer Overflow (BOF) has been a ubiquitous security vulnerability for more than three
decades, potentially compromising any software application or system. This vulnerability …

Signature-free buffer overflow attack blocker

X Wang, CC Pan, P Liu, S Zhu - US Patent 8,443,442, 2013 - Google Patents
Throughout the history of cyber security, buffer over? ow is one of the most serious
vulnerabilities in computer systems.(Note that according to this disclosure 'buffer'could be a …

Safestack: Automatically patching stack-based buffer overflow vulnerabilities

G Chen, H Jin, D Zou, BB Zhou, Z Liang… - … on Dependable and …, 2013 - ieeexplore.ieee.org
Buffer overflow attacks still pose a significant threat to the security and availability of today's
computer systems. Although there are a number of solutions proposed to provide adequate …

[HTML][HTML] TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection.

K Avijit, P Gupta, D Gupta - USENIX Security Symposium, 2004 - usenix.org
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather
than as first-class objects. Manipulation of arrays as pointers and primitive pointer arithmetic …