Defending against Buffer-Overflow Vulnerabilities

被引:5
|
作者
Padmanabhuni, Bindu Madhavi [1 ]
Tan, Hee Beng Kuan [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Informat Engn Div, Singapore, Singapore
关键词
Buffer overflow; Computer security; Vulnerabilities;
D O I
10.1109/MC.2011.229
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a vulnerability that represents a severe security threat.
引用
收藏
页码:53 / 60
页数:8
相关论文
共 50 条
  • [21] ASSESSING TEST SUITES FOR BUFFER OVERFLOW VULNERABILITIES
    Shahriar, Hossain
    Zulkernine, Mohammad
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2010, 20 (01) : 73 - 101
  • [22] Buffer overflow vulnerabilities in CUDA: a preliminary analysis
    Miele, Andrea
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2016, 12 (02) : 113 - 120
  • [23] Automatic Exploit Generation for Buffer Overflow Vulnerabilities
    Xu, Luhang
    Jia, Weixi
    Dong, Wei
    Li, Yongjun
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 463 - 468
  • [24] Statically detecting likely buffer overflow vulnerabilities
    Larochelle, D
    Evans, D
    USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 177 - 189
  • [25] Analysis of Signature and Signature Free Buffer-overflow detection for gif and jpg format
    Pawar, Pankaj B.
    Nagle, Malti
    Kawadkar, Pankaj K.
    Ambare, Padmashree Kunthe
    2013 TENTH INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS (WOCN), 2013,
  • [26] Static analysis method for detecting buffer overflow vulnerabilities
    Puchkov, FM
    Shapchenko, KA
    PROGRAMMING AND COMPUTER SOFTWARE, 2005, 31 (04) : 179 - 189
  • [27] PointGuard™:: Protecting pointers from buffer overflow vulnerabilities
    Cowan, C
    Beattie, S
    Johansen, J
    Wagle, P
    USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, 2003, : 91 - 104
  • [28] BovInspector: Automatic Inspection and Repair of Buffer Overflow Vulnerabilities
    Gao, Fengjuan
    Wang, Linzhang
    Li, Xuandong
    2016 31ST IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE), 2016, : 786 - 791
  • [29] Automated exploit generation for stack buffer overflow vulnerabilities
    V. A. Padaryan
    V. V. Kaushan
    A. N. Fedotov
    Programming and Computer Software, 2015, 41 : 373 - 380
  • [30] Automated exploit generation for stack buffer overflow vulnerabilities
    Padaryan, V. A.
    Kaushan, V. V.
    Fedotov, A. N.
    PROGRAMMING AND COMPUTER SOFTWARE, 2015, 41 (06) : 373 - 380