Sciweavers

6 search results - page 1 / 2
» Evolving Buffer Overflow Attacks with Detector Feedback
Sort
View
EVOW
2007
Springer
13 years 8 months ago
Evolving Buffer Overflow Attacks with Detector Feedback
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
GECCO
2006
Springer
124views Optimization» more  GECCO 2006»
13 years 8 months ago
On evolving buffer overflow attacks using genetic programming
In this work, we employed genetic programming to evolve a "white hat" attacker; that is to say, we evolve variants of an attack with the objective of providing better de...
Hilmi Günes Kayacik, Malcolm I. Heywood, A. N...
SIGSOFT
2008
ACM
14 years 5 months ago
Marple: a demand-driven path-sensitive buffer overflow detector
Despite increasing efforts in detecting and managing software security vulnerabilities, the number of security attacks is still rising every year. As software becomes more complex...
Wei Le, Mary Lou Soffa
ACSAC
2005
IEEE
13 years 10 months ago
Evolving Successful Stack Overflow Attacks for Vulnerability Testing
The work presented in this paper is intended to test crucial system services against stack overflow vulnerabilities. The focus of the test is the user-accessible variables, that i...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood, M...
PST
2008
13 years 6 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood