[PDF][PDF] Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks.

C Cowan, C Pu, D Maier, J Walpole, P Bakke… - USENIX security …, 1998 - usenix.org
This paper presents a systematic solution to the persistent problem of buffer overflow
attacks. Buffer overflow attacks gained notoriety in 1988 as part of the Morris Worm incident …

RIPE: Runtime intrusion prevention evaluator

J Wilander, N Nikiforakis, Y Younan, M Kamkar… - Proceedings of the 27th …, 2011 - dl.acm.org
Despite the plethora of research done in code injection countermeasures, buffer overflows
still plague modern software. In 2003, Wilander and Kamkar published a comparative …

Signature-free buffer overflow attack blocker

X Wang, CC Pan, P Liu, S Zhu - US Patent 8,443,442, 2013 - Google Patents
Throughout the history of cyber security, buffer over? ow is one of the most serious
vulnerabilities in computer systems.(Note that according to this disclosure 'buffer'could be a …

A dynamic mechanism for recovering from buffer overflow attacks

S Sidiroglou, G Giovanidis, AD Keromytis - Information Security: 8th …, 2005 - Springer
We examine the problem of containing buffer overflow attacks in a safe and efficient manner.
Briefly, we automatically augment source code to dynamically catch stack and heap-based …

A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)

M Rinard, C Cadar, D Dumitran… - 20th Annual Computer …, 2004 - ieeexplore.ieee.org
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to
cause the program to write beyond the bounds of an allocated memory block to corrupt other …

[图书][B] Buffer overflow attacks

JC Foster, V Osipov, N Bhalla - 2005 - dl.acm.org
Will the Code You Write Today Headline Tomorrow's BugTraq Mail List? Includes Numbered-
by-Line Exploit Code Examples That Illustrate the Differences Between Stack Overflows …

[PDF][PDF] A Practical Dynamic Buffer Overflow Detector.

O Ruwase, MS Lam - NDSS, 2004 - cs.cmu.edu
Despite previous efforts in auditing software manually and automatically, buffer overruns are
still being discovered in programs in use. A dynamic bounds checker detects buffer overruns …

[PDF][PDF] Detection and prevention of stack buffer overflow attacks

BA Kuperman, CE Brodley, H Ozdoganoglu… - Communications of the …, 2005 - dl.acm.org
Detection and prevention of stack buffer overflow attacks Page 1 50 November 2005/Vol. 48,
No. 11 COMMUNICATIONS OF THE ACM Page 2 COMMUNICATIONS OF THE ACM …

[PDF][PDF] A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention.

J Wilander, M Kamkar - Ndss, 2003 - lass.cs.umass.edu
The size and complexity of software systems is growing, increasing the number of bugs.
Many of these bugs constitute security vulnerabilities. Most common of these bugs is the …

Buffer overflows: Attacks and defenses for the vulnerability of the decade

C Cowan, F Wagle, C Pu, S Beattie… - … Exposition. DISCEX'00, 2000 - ieeexplore.ieee.org
Buffer overflows have been the most common form of security vulnerability for the last ten
years. Moreover, buffer overflow vulnerabilities dominate the area of remote network …