共 50 条
- [31] A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device IEEE ACCESS, 2018, 6 : 72862 - 72869
- [32] Software Vulnerabilities by Example: A Fresh Look at the Buffer Overflow Problem-Bypassing SafeSEH JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (01): : 1 - 13
- [33] Research of buffer overflow vulnerabilities detection based on novel K-means clustering Journal of Computational Information Systems, 2015, 11 (04): : 1453 - 1461
- [36] Enforcement of architectural safety guards to deter malicious code attacks through buffer overflow vulnerabilities ORGANIC AND PERVASIVE COMPUTING - ARCS 2004, 2004, 2981 : 47 - 60
- [37] A methodology for the automated identification of buffer overflow vulnerabilities in executable software without source-code DEPENDABLE COMPUTING, PROCEEDINGS, 2005, 3747 : 20 - 34
- [38] Predicting Buffer Overflow Vulnerabilities through Mining Light-Weight Static Code Attributes 2014 IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING WORKSHOPS (ISSREW), 2014, : 317 - 322
- [39] A Study of Overflow Vulnerabilities on GPUs NETWORK AND PARALLEL COMPUTING, 2016, 9966 : 103 - 115
- [40] A novel approach for analyzing buffer overflow vulnerabilities in binary executables by using machine learning techniques JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2019, 34 (04): : 1695 - 1704