共 50 条
- [31] Auditing Buffer Overflow Vulnerabilities using Hybrid Static-Dynamic Analysis 2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2014, : 394 - 399
- [32] Buffer Overflow Vulnerability Detection based on Format-Matching on Source Level PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE, 2014, 101 : 298 - 301
- [33] Taxonomy of C Overflow Vulnerabilities Attack SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 376 - +
- [35] The Cost of Preventing a Buffer Overflow 2014 ZONE 1 CONFERENCE OF THE AMERICAN SOCIETY FOR ENGINEERING EDUCATION (ASEE ZONE 1), 2014,
- [37] Stack Overflow Fence: A Technique for Defending Against Buffer Overflow Attacks JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (02): : 129 - 136
- [38] Vulnerability scanning for buffer overflow ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 116 - 117
- [39] Software Vulnerabilities by Example: A Fresh Look at the Buffer Overflow Problem-Bypassing SafeSEH JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2012, 7 (01): : 1 - 13
- [40] Research of buffer overflow vulnerabilities detection based on novel K-means clustering Journal of Computational Information Systems, 2015, 11 (04): : 1453 - 1461