Sciweavers

2 search results - page 1 / 1
» Using Greedy Hamiltonian Call Paths to Detect Stack Smashing...
Sort
View
ISW
2004
Springer
13 years 9 months ago
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks
The ICAT statistics over the past few years have shown at least one out of every five CVE and CVE candidate vulnerabilities have been due to buffer overflows. This constitutes a si...
Mark Foster, Joseph N. Wilson, Shigang Chen
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
13 years 9 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...