共 50 条
- [1] Buffer-overflow protection: The theory 2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 454 - 458
- [2] Detecting Buffer-Overflow Vulnerabilities in Smart Grid Devices via Automatic Static Analysis PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 813 - 817
- [3] Stack Overflow Fence: A Technique for Defending Against Buffer Overflow Attacks JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (02): : 129 - 136
- [4] StackOFFence: A technique for defending against buffer overflow attacks ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 656 - 661
- [5] Arbitrary copy: Bypassing buffer-overflow protections 2006 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2006, : 580 - 584
- [6] Survey of Protections from Buffer-Overflow Attacks ENGINEERING JOURNAL-THAILAND, 2011, 15 (02): : 31 - 52
- [8] The Implementation of Secure Canary Word for Buffer-Overflow Protection 2009 IEEE INTERNATIONAL CONFERENCE ON ELECTRO/INFORMATION TECHNOLOGY, 2009, : 54 - 59
- [9] Defending Code from the Internet of Things against Buffer Overflow 2014 BRAZILIAN SYMPOSIUM ON COMPUTER NETWORKS AND DISTRIBUTED SYSTEMS (SBRC), 2014, : 293 - 301
- [10] Buffer overflow and format string overflow vulnerabilities SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (05): : 423 - 460