Method of integer overflow detection to avoid buffer overflow

被引:0
|
作者
School of Computer Science and Engineering, Southeast University, Nanjing 211189, China [1 ]
不详 [2 ]
机构
来源
J. Southeast Univ. Engl. Ed. | 2009年 / 2卷 / 219-223期
关键词
Buffer storage;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Detection of Network Buffer Overflow Attacks: A Case Study
    Maros, Barabas
    Ivan, Homoliak
    Matej, Kacic
    Petr, Hanacek
    [J]. 2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
  • [32] BUFFER OVERFLOW DETECTION IN DEVS SIMULATION USING CANARIES
    Lee, Hae Young
    [J]. 2017 WINTER SIMULATION CONFERENCE (WSC), 2017, : 4554 - 4555
  • [33] Static analysis method for detecting buffer overflow vulnerabilities
    Puchkov, FM
    Shapchenko, KA
    [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2005, 31 (04) : 179 - 189
  • [34] A hybrid method of defense against buffer overflow attacks
    Dasari, Annapurna
    Dasgupta, Partha
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 195 - 200
  • [35] Static Analysis Method for Detecting Buffer Overflow Vulnerabilities
    F. M. Puchkov
    K. A. Shapchenko
    [J]. Programming and Computer Software, 2005, 31 : 179 - 189
  • [36] A Taxonomy of Buffer Overflow Characteristics
    Bishop, Matt
    Engle, Sophie
    Howard, Damien
    Whalen, Sean
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (03) : 305 - 317
  • [37] The Cost of Preventing a Buffer Overflow
    Gordonov, Anatoliy S.
    [J]. 2014 ZONE 1 CONFERENCE OF THE AMERICAN SOCIETY FOR ENGINEERING EDUCATION (ASEE ZONE 1), 2014,
  • [38] Stack Overflow Fence: A Technique for Defending Against Buffer Overflow Attacks
    Madan, Bharat B.
    Phoha, Shashi
    Trivedi, Kishor S.
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (02): : 129 - 136
  • [39] Vulnerability scanning for buffer overflow
    Iyer, A
    Liebrock, LM
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 116 - 117
  • [40] A Method for Hensel Code Overflow Detection
    Li, Xinkai
    Lu, Chao
    Sjogren, Jon A.
    [J]. APPLIED COMPUTING REVIEW, 2012, 12 (01): : 6 - 11