Defending against Buffer-Overflow Vulnerabilities

被引:5
|
作者
Padmanabhuni, Bindu Madhavi [1 ]
Tan, Hee Beng Kuan [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Informat Engn Div, Singapore, Singapore
关键词
Buffer overflow; Computer security; Vulnerabilities;
D O I
10.1109/MC.2011.229
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a vulnerability that represents a severe security threat.
引用
收藏
页码:53 / 60
页数:8
相关论文
共 50 条
  • [1] Buffer-overflow protection: The theory
    Piromsopa, Krerk
    Enbody, Richard J.
    2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 454 - 458
  • [2] Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis
    Ying, Huan
    Zhang, Yanmiao
    Han, Lifang
    Cheng, Yushi
    Li, Jiyuan
    Ji, Xiaoyu
    Xu, Wenyuan
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 813 - 817
  • [3] Stack Overflow Fence: A Technique for Defending Against Buffer Overflow Attacks
    Madan, Bharat B.
    Phoha, Shashi
    Trivedi, Kishor S.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (02): : 129 - 136
  • [4] StackOFFence: A technique for defending against buffer overflow attacks
    Madan, BB
    Phoha, S
    Trivedi, KS
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 656 - 661
  • [5] Arbitrary copy: Bypassing buffer-overflow protections
    Piromsopa, Krerk
    Enbody, Richard J.
    2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 580 - 584
  • [6] Survey of Protections from Buffer-Overflow Attacks
    Piromsopa, Krerk
    Enbody, Richard J.
    ENGINEERING JOURNAL-THAILAND, 2011, 15 (02): : 31 - 52
  • [7] Secure bit: Transparent, hardware buffer-overflow protection
    Piromsopa, Krerk
    Enbody, Richard J.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (04) : 365 - 376
  • [8] The Implementation of Secure Canary Word for Buffer-Overflow Protection
    Chiamwongpaet, Sirisara
    Piromsopa, Krerk
    2009 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2009, : 54 - 59
  • [9] Defending Code from the Internet of Things against Buffer Overflow
    Teixeira, Fernando A.
    Machado, Gustavo V.
    Fonseca, Pablo M.
    Pereira, Fernando M. Q.
    Wong, Hao Chi
    Nogueira, Jose M. S.
    Oliveira, Leonardo B.
    2014 BRAZILIAN SYMPOSIUM ON COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS (SBRC), 2014, : 293 - 301
  • [10] Buffer overflow and format string overflow vulnerabilities
    Lhee, KS
    Chapin, SJ
    SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (05): : 423 - 460