J Wilander, N Nikiforakis, Y Younan, M Kamkar… - Proceedings of the 27th …, 2011 - dl.acm.org
Despite the plethora of research done in code injection countermeasures, buffer overflows still plague modern software. In 2003, Wilander and Kamkar published a comparative …
X Wang, CC Pan, P Liu, S Zhu - US Patent 8,443,442, 2013 - Google Patents
Throughout the history of cyber security, buffer over? ow is one of the most serious vulnerabilities in computer systems.(Note that according to this disclosure 'buffer'could be a …
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based …
M Rinard, C Cadar, D Dumitran… - 20th Annual Computer …, 2004 - ieeexplore.ieee.org
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt other …
Will the Code You Write Today Headline Tomorrow's BugTraq Mail List? Includes Numbered- by-Line Exploit Code Examples That Illustrate the Differences Between Stack Overflows …
Despite previous efforts in auditing software manually and automatically, buffer overruns are still being discovered in programs in use. A dynamic bounds checker detects buffer overruns …
BA Kuperman, CE Brodley, H Ozdoganoglu… - Communications of the …, 2005 - dl.acm.org
Detection and prevention of stack buffer overflow attacks Page 1 50 November 2005/Vol. 48, No. 11 COMMUNICATIONS OF THE ACM Page 2 COMMUNICATIONS OF THE ACM …
J Wilander, M Kamkar - Ndss, 2003 - lass.cs.umass.edu
The size and complexity of software systems is growing, increasing the number of bugs. Many of these bugs constitute security vulnerabilities. Most common of these bugs is the …
C Cowan, F Wagle, C Pu, S Beattie… - … Exposition. DISCEX'00, 2000 - ieeexplore.ieee.org
Buffer overflows have been the most common form of security vulnerability for the last ten years. Moreover, buffer overflow vulnerabilities dominate the area of remote network …