共 50 条
- [41] The random forests model of detecting network-based buffer overflow attacks INFORMATION SCIENCE AND ELECTRONIC ENGINEERING, 2017, : 411 - 414
- [44] Detecting integer overflow vulnerabilities in binary executables based on Target filtering and dynamic taint tracing 1600, Chinese Institute of Electronics (23):
- [45] Taxonomy of C Overflow Vulnerabilities Attack SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 376 - +
- [47] A Smart Fuzzing Method for Detecting Heap-Based Buffer Overflow in Executable Codes 2015 IEEE 21ST PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2015, : 42 - 49
- [48] Method of integer overflow detection to avoid buffer overflow J. Southeast Univ. Engl. Ed., 2009, 2 (219-223):
- [50] The Cost of Preventing a Buffer Overflow 2014 ZONE 1 CONFERENCE OF THE AMERICAN SOCIETY FOR ENGINEERING EDUCATION (ASEE ZONE 1), 2014,