Sciweavers

41 search results - page 2 / 9
» Testing static analysis tools using exploitable buffer overf...
Sort
View
USS
2004
13 years 6 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
SCAM
2008
IEEE
13 years 11 months ago
The Evolution and Decay of Statically Detected Source Code Vulnerabilities
The presence of vulnerable statements in the source code is a crucial problem for maintainers: properly monitoring and, if necessary, removing them is highly desirable to ensure h...
Massimiliano Di Penta, Luigi Cerulo, Lerina Aversa...
ACMSE
2006
ACM
13 years 10 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
TDSC
2010
191views more  TDSC 2010»
13 years 3 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
ICISS
2010
Springer
13 years 2 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...