Defending against Buffer-Overflow Vulnerabilities

被引:5
|
作者
Padmanabhuni, Bindu Madhavi [1 ]
Tan, Hee Beng Kuan [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Informat Engn Div, Singapore, Singapore
关键词
Buffer overflow; Computer security; Vulnerabilities;
D O I
10.1109/MC.2011.229
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a vulnerability that represents a severe security threat.
引用
收藏
页码:53 / 60
页数:8
相关论文
共 50 条
  • [31] Static Analysis Method for Detecting Buffer Overflow Vulnerabilities
    F. M. Puchkov
    K. A. Shapchenko
    Programming and Computer Software, 2005, 31 : 179 - 189
  • [32] Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios
    Hitefield, S. D.
    Fowler, M.
    Clancy, T. Charles
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1921 - 1927
  • [33] Defending against Web Application Vulnerabilities
    Antunes, Nuno
    Vieira, Marco
    COMPUTER, 2012, 45 (02) : 66 - 72
  • [34] Self-similar traffic and upper bounds to buffer-overflow probability in an ATM queue
    Tsybakov, B
    Georganas, ND
    PERFORMANCE EVALUATION, 1998, 32 (01) : 57 - 80
  • [35] HackSim: An automation of penetration testing for remote buffer overflow vulnerabilities
    Kwon, OH
    Lee, SM
    Lee, H
    Kim, J
    Kim, SC
    Nam, GW
    Park, JG
    INFORMATION NETWORKING: CONVERGENCE IN BROADBAND AND MOBILE NETWORKING, 2005, 3391 : 652 - 661
  • [36] Method for precisely detecting buffer overflow vulnerabilities in C programs
    School of Computer Science and Technology, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    Beijing Hangkong Hangtian Daxue Xuebao, 2008, 3 (319-322): : 319 - 322
  • [37] Assisting in Auditing of Buffer Overflow Vulnerabilities via Machine Learning
    Meng, Qingkun
    Feng, Chao
    Zhang, Bin
    Tang, Chaojing
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2017, 2017
  • [38] Buffer overflow attacks defending using a segment-based approach
    Yang, Wei-Zhi
    Tan, Yu-An
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1559 - 1562
  • [39] Buttercup: On network-based detection of polymorphic buffer overflow vulnerabilities
    Pasupulati, A
    Coit, J
    Levitt, K
    Wu, SF
    Li, SH
    Kuo, JC
    Fan, KP
    NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM: MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, 2004, : 235 - 248
  • [40] SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities
    Chen, Gang
    Jin, Hai
    Zou, Deqing
    Zhou, Bing Bing
    Liang, Zhenkai
    Zheng, Weide
    Shi, Xuanhua
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (06) : 368 - 379