Defending against Buffer-Overflow Vulnerabilities

被引:5
|
作者
Padmanabhuni, Bindu Madhavi [1 ]
Tan, Hee Beng Kuan [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Informat Engn Div, Singapore, Singapore
关键词
Buffer overflow; Computer security; Vulnerabilities;
D O I
10.1109/MC.2011.229
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a vulnerability that represents a severe security threat.
引用
收藏
页码:53 / 60
页数:8
相关论文
共 50 条
  • [41] Rule-Based Source Level Patching of Buffer Overflow Vulnerabilities
    Shahriar, Hossain
    Haddad, Hisham M.
    PROCEEDINGS OF THE 2013 10TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2013, : 627 - 632
  • [42] Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
    Li, Yufeng
    Liu, Mengxiao
    Cao, Chenhong
    Li, Jiangtao
    FUTURE INTERNET, 2023, 15 (05):
  • [43] A comparative analysis of Buffer Overflow vulnerabilities in High-End IoT devices
    Calatayud, Blas Molina
    Meany, Liam
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 694 - 701
  • [44] ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
    Xu, Lili
    Xu, Mingjie
    Li, Feng
    Huo, Wei
    CYBERSECURITY, 2020, 3 (01)
  • [45] Auditing buffer overflow vulnerabilities using hybrid static-dynamic analysis
    Padmanabhuni, Bindu Madhavi
    Tan, Hee Beng Kuan
    IET SOFTWARE, 2016, 10 (02) : 54 - 61
  • [46] Characterizing Buffer Overflow Vulnerabilities in Large C/C plus plus Projects
    Pereira, Jose D'Abruzzo
    Ivaki, Naghmeh
    Vieira, Marco
    IEEE ACCESS, 2021, 9 : 142879 - 142892
  • [47] ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
    Lili Xu
    Mingjie Xu
    Feng Li
    Wei Huo
    Cybersecurity, 3
  • [48] Auditing Buffer Overflow Vulnerabilities using Hybrid Static-Dynamic Analysis
    Padmanabhuni, Bindu Madhavi
    Tan, Hee Beng Kuan
    2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2014, : 394 - 399
  • [49] Modelling Buffer-Overflow in 6LoWPAN-Based Resource-Constraint IoT-Healthcare Network
    Himanshu Verma
    Naveen Chauhan
    Lalit Kumar Awasthi
    Wireless Personal Communications, 2023, 129 : 1113 - 1128
  • [50] Modelling Buffer-Overflow in 6LoWPAN-Based Resource-Constraint IoT-Healthcare Network
    Verma, Himanshu
    Chauhan, Naveen
    Awasthi, Lalit Kumar
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 129 (02) : 1113 - 1128