[PDF][PDF] A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention.

J Wilander, M Kamkar - Ndss, 2003 - lass.cs.umass.edu
The size and complexity of software systems is growing, increasing the number of bugs.
Many of these bugs constitute security vulnerabilities. Most common of these bugs is the …

RIPE: Runtime intrusion prevention evaluator

J Wilander, N Nikiforakis, Y Younan, M Kamkar… - Proceedings of the 27th …, 2011 - dl.acm.org
Despite the plethora of research done in code injection countermeasures, buffer overflows
still plague modern software. In 2003, Wilander and Kamkar published a comparative …

[HTML][HTML] Real-World Buffer Overflow Protection for Userspace and Kernelspace.

M Dalton, H Kannan, C Kozyrakis - USENIX Security Symposium, 2008 - usenix.org
Despite having been around for more than 25 years, buffer overflow attacks are still a major
security threat for deployed software. Existing techniques for buffer overflow detection …

[PDF][PDF] Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks.

C Cowan, C Pu, D Maier, J Walpole, P Bakke… - USENIX security …, 1998 - usenix.org
This paper presents a systematic solution to the persistent problem of buffer overflow
attacks. Buffer overflow attacks gained notoriety in 1988 as part of the Morris Worm incident …

RAD: A compile-time solution to buffer overflow attacks

T Chiueh, FH Hsu - Proceedings 21st International Conference …, 2001 - ieeexplore.ieee.org
Buffer overflow attack can inflict upon almost arbitrary programs and is one of the most
common vulnerabilities that can seriously compromise the security of a network-attached …

Buffer overflow and format string overflow vulnerabilities

KS Lhee, SJ Chapin - Software: practice and experience, 2003 - Wiley Online Library
Buffer overflow vulnerabilities are among the most widespread of security problems.
Numerous incidents of buffer overflow attacks have been reported and many solutions have …

[PDF][PDF] A Practical Dynamic Buffer Overflow Detector.

O Ruwase, MS Lam - NDSS, 2004 - cs.cmu.edu
Despite previous efforts in auditing software manually and automatically, buffer overruns are
still being discovered in programs in use. A dynamic bounds checker detects buffer overruns …

A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)

M Rinard, C Cadar, D Dumitran… - 20th Annual Computer …, 2004 - ieeexplore.ieee.org
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to
cause the program to write beyond the bounds of an allocated memory block to corrupt other …

[图书][B] Buffer overflow attacks

JC Foster, V Osipov, N Bhalla - 2005 - dl.acm.org
Will the Code You Write Today Headline Tomorrow's BugTraq Mail List? Includes Numbered-
by-Line Exploit Code Examples That Illustrate the Differences Between Stack Overflows …

[PDF][PDF] Testing C programs for buffer overflow vulnerabilities

ED Haugh, M Bishop - 2002 - elhacker.info
Security vulnerabilities often result from buffer overflows. A testing technique that
instruments programs with code that keeps track of memory buffers, and checks arguments …