共 50 条
- [1] Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic 2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
- [3] Buffer overflow and format string overflow vulnerabilities SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (05): : 423 - 460
- [4] Method of integer overflow detection to avoid buffer overflow J. Southeast Univ. Engl. Ed., 2009, 2 (219-223):
- [5] The Cost of Preventing a Buffer Overflow 2014 ZONE 1 CONFERENCE OF THE AMERICAN SOCIETY FOR ENGINEERING EDUCATION (ASEE ZONE 1), 2014,
- [6] Vulnerability scanning for buffer overflow ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 116 - 117
- [7] Taxonomy of C Overflow Vulnerabilities Attack SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 376 - +
- [8] Buffer-overflow protection: The theory 2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 454 - 458
- [9] New mechanism for buffer overflow prevention IMECS 2006: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, 2006, : 481 - 486
- [10] The Principle and Prevention of Windows Buffer Overflow PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 1285 - 1288