Sciweavers

7 search results - page 1 / 2
» StackOFFence: A Technique for Defending Against Buffer Overf...
Sort
View
ITCC
2005
IEEE
13 years 10 months ago
StackOFFence: A Technique for Defending Against Buffer Overflow Attacks
Bharat B. Madan, Shashi Phoha, Kishor S. Trivedi
ACSAC
2003
IEEE
13 years 8 months ago
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...
IJISEC
2006
106views more  IJISEC 2006»
13 years 4 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
CISC
2006
Springer
81views Cryptology» more  CISC 2006»
13 years 8 months ago
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
Buffer overflow(BOF) has been the most common form of vulnerability in software systems today, and many methods exist to defend software systems against BOF attacks. Among them, th...
Deok Jin Kim, Tae Hyung Kim, Jong Kim, Sung Je Hon...
CCS
2009
ACM
13 years 8 months ago
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today...
Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy