共 50 条
- [31] Detection of Network Buffer Overflow Attacks: A Case Study [J]. 2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
- [32] BUFFER OVERFLOW DETECTION IN DEVS SIMULATION USING CANARIES [J]. 2017 WINTER SIMULATION CONFERENCE (WSC), 2017, : 4554 - 4555
- [34] A hybrid method of defense against buffer overflow attacks [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 195 - 200
- [35] Static Analysis Method for Detecting Buffer Overflow Vulnerabilities [J]. Programming and Computer Software, 2005, 31 : 179 - 189
- [37] The Cost of Preventing a Buffer Overflow [J]. 2014 ZONE 1 CONFERENCE OF THE AMERICAN SOCIETY FOR ENGINEERING EDUCATION (ASEE ZONE 1), 2014,
- [38] Stack Overflow Fence: A Technique for Defending Against Buffer Overflow Attacks [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (02): : 129 - 136
- [39] Vulnerability scanning for buffer overflow [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 116 - 117
- [40] A Method for Hensel Code Overflow Detection [J]. APPLIED COMPUTING REVIEW, 2012, 12 (01): : 6 - 11