Limpar
109 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Jornais Acesso aberto

J. T. Vigne, Max Blumenthai, T. W. Smartt,

... Club Picnic, Floods in France Rhone and Loire Overflow, Charter Policy Directors at Bulawayo, American Mails Disembarkation ... W. Butler's Warning, Trouble on a Debris Heap Debris=Washers Charged with Assault, Moors Punished Villages ...

1907 - Gale Group | NCCO EuropeAfrica

Artigo Acesso aberto Revisado por pares

Ning Huang, Shuguang Huang, Chao Chang,

Heap overflow is a common error of buffer overflow in Linux. The control flow of a program may ... by checking the control flow state. However, the heap overflow data rarely lead to a control flow hijacking ... It is difficult to analyze the exploitability of heap overflow automatically through the existing analysis technology. For the heap overflow errors in Linux, we summarize the features of ... building the detection model of the exploitability of heap overflow, and proposing a method for analyzing the exploitability ...

Tópico(s): Software Testing and Debugging Techniques

2019 - IOP Publishing | IOP Conference Series Earth and Environmental Science

Capítulo de livro Acesso aberto Revisado por pares

Nick Nikiforakis, Frank Piessens, Wouter Joosen,

... little attention and thus today, the problem of heap overflows is largely unsolved. In this paper we present HeapSentry, a system designed to detect and stop heap overflow attacks through the cooperation of the memory allocation library of a program and the operating system's kernel. HeapSentry places unique random canaries at the end of each heap object which are later checked by the kernel, ...

Tópico(s): Diamond and Carbon-based Materials Research

2013 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Shih-Kun Huang, Min-Hsiang Huang, Po-Yen Huang, Han-Lin Lu, Chung-Wei Lai,

... can deal with vulnerability types including stack and heap overflows, format string, and the use of uninitialized variables. ... 211 times faster than the initial attempt. For heap overflow vulnerability, we can automatically exploit the unlink() macro ...

Tópico(s): Advanced Malware Detection Techniques

2014 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Reliability

Capítulo de livro Acesso aberto Revisado por pares

Sandeep Bhatkar, R. Sekar,

... to memory corruption vulnerabilities such as buffer overflows, heap overflows, etc. Several techniques have been developed to defend ...

Tópico(s): Diamond and Carbon-based Materials Research

2008 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Acesso aberto Revisado por pares

R. Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu Upadhyaya,

... layout of a process in a buffer or heap overflow attack. In this paper, we present an analysis ...

Tópico(s): Advanced Malware Detection Techniques

2004 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

El Habib Boudjema, Sergey Verlan, Lynda Mokdad, Christèle Faure,

... vulnerabilities are considered (taint related, stack overflow, and heap overflow). Based on the angr framework as a supporting ...

Tópico(s): Software Testing and Debugging Techniques

2019 - Wiley | Security and Privacy

Artigo

Qiang Zeng, Dinghao Wu, Peng Liu,

... case study, software cruising is applied to the heap buffer overflow problem. Previous mitigation and detection techniques for this ... tedious manual program transformation. We present a concurrent heap buffer overflow detector, Cruiser, in which a concurrent thread is added to the user program to monitor heap integrity, and custom lock-free data structures and ...

Tópico(s): Parallel Computing and Optimization Techniques

2011 - Association for Computing Machinery | ACM SIGPLAN Notices

Artigo Revisado por pares

Chandra M. R. Kintala,

... and lack of virtual memory. Memory (stack and heap) overflow problems occur in such software components because of ...

Tópico(s): Distributed systems and fault tolerance

2009 - University of Giessen | Journal of automata, languages and combinatorics

Artigo

Xavier Allamigeon, Charles Hymans,

Tópico(s): Formal Methods in Verification

2007 - Springer Nature | Journal in Computer Virology

Artigo Acesso aberto Revisado por pares

Donghai Tian, Xuanya Li, Mo Chen, Changzhen Hu,

Heap buffer overflow has been extensively studied for many years, but it remains a severe threat to software security. ... In this paper, we present iCruiser, an efficient heap buffer overflow monitoring system that uses the multi-core technology. ... with existing programs, and it can detect the heap buffer overflows concurrently. Compared with the latest heap protection systems, ... security guarantees. Experiments show that iCruiser can detect heap buffer overflow attacks effectively with a little performance overhead.

Tópico(s): Diamond and Carbon-based Materials Research

2014 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Information and Systems

Artigo Acesso aberto Revisado por pares

Yuzhu Ren, Weiyu Dong, Jian Lin, Xinliang Miao,

... programs and detect vulnerabilities such as stack overflow, heap overflow and so on. Finally, we verify our prototype ...

Tópico(s): Software Testing and Debugging Techniques

2019 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Acesso aberto Revisado por pares

Surupa Biswas, Thomas W. Carley, Matthew Simpson, Bhuvan Middha, Rajeev Barua,

... methods are able to grow the stack or heap beyond its overflow by an amount that varies widely by application---the amount of recovered space ranges from 0.7 to 93.5% of the combined stack and heap size.

Tópico(s): Radiation Effects in Electronics

2006 - Association for Computing Machinery | ACM Transactions on Embedded Computing Systems

Artigo Revisado por pares

Donghai Tian, Xiaoqi Jia, Junhua Chen, Changzhen Hu, Jingfeng Xue,

Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To ... of these existing methods focus on user-level heap overflow detection. Only a few methods are proposed for ... evaluations show that our system can detect kernel heap overflow attacks effectively with minimal performance cost.

Tópico(s): Advanced Malware Detection Techniques

2016 - Institute of Electrical and Electronics Engineers | China Communications

Capítulo de livro Acesso aberto Revisado por pares

Yves Younan, Wouter Joosen, Frank Piessens,

Tópico(s): Cryptographic Implementations and Security

2006 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Acesso aberto Revisado por pares

Francesco Gadaleta, Yves Younan, Wouter Joosen,

... that combines the notoriously hard to reliably exploit heap-based buffer overflow with the use of an in-browser scripting language for improved reliability. A typical heap-spraying attack allocates a high number of objects ...

Tópico(s): Web Application Security Vulnerabilities

2010 - Springer Science+Business Media | Lecture notes in computer science

Artigo

Emery D. Berger, Benjamin G. Zorn,

... a wide range of memory errors, including a heap-based buffer overflow in an actual application.

Tópico(s): Security and Verification in Computing

2006 - Association for Computing Machinery | ACM SIGPLAN Notices

Capítulo de livro Acesso aberto Revisado por pares

Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis,

... augment source code to dynamically catch stack and heap-based buffer overflow and underflow attacks, and recover from them by allowing the program to continue execution. Our hypothesis is that we can ...

Tópico(s): Distributed systems and fault tolerance

2005 - Springer Science+Business Media | Lecture notes in computer science

Capítulo de livro Acesso aberto Revisado por pares

Alexandra Boldyreva, Taesoo Kim, Richard Lipton, Bogdan Warinschi,

... remote memory attestation; we concentrate on provably detecting heap-based overflow attacks and consider the setting where we aim to protect the memory in a remote system. We present two protocols offering various efficiency and security trade-offs (but all solutions are efficient enough for practical use as our implementation shows) that detect the presence of injected malicious code or data in remotely-stored heap memory. While our solutions offer protection only against ...

Tópico(s): Digital and Cyber Forensics

2016 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Stelios Sidiroglou, Angelos D. Keromytis,

... augment source code to dynamically catch stack and heap-based buffer overflow and underflow attacks, and recover from them by allowing the program to continue execution. Our hypothesis is that we can ...

Tópico(s): Advanced Malware Detection Techniques

2006 - Springer Science+Business Media | International Journal of Information Security

Artigo Revisado por pares

Maryam Mouzarani, Babak Sadeghiyan, Mohammad Zolfaghari,

... heap‐based vulnerabilities in executable codes, that is, heap‐based buffer overflow, buffer underwrite, buffer over‐read, buffer under‐read, ...

Tópico(s): Advanced Malware Detection Techniques

2016 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto Revisado por pares

Fadi Yilmaz, Meera Sridhar, Abhinav Mohanty, Vasant Tendulkar, Kevin W. Hamlen,

... 3) integer overflow, (4) buffer overflow, or (5) heap overflow vulnerability sub-classes. To improve web vulnerability analysis ...

Tópico(s): Web Application Security Vulnerabilities

2021 - Elsevier BV | Computers & Security

Artigo

Misha Zitser, Richard P. Lippmann, Tim Leek,

... and a "OK" case without buffer overflows. Buffer overflows varied and included stack, heap, bss and data buffers; access above and below ...

Tópico(s): Software Reliability and Analysis Research

2004 - Association for Computing Machinery | ACM SIGSOFT Software Engineering Notes

Artigo

Duc-Hiep Chu, Joxan Jaffar, Rasool Maghareh,

... result, the need to develop methods to avoid heap overflow errors in safety-critical embedded systems has increased. ...

Tópico(s): Embedded Systems Design Techniques

2016 - Association for Computing Machinery | ACM SIGPLAN Notices

Capítulo de livro Revisado por pares

Maryam Mouzarani, Ali Kamali, Sara Baradaran, Mahdi Heidari,

... improving the efficiency of symbolic execution and detecting heap overflow vulnerability in executable codes. Instead of applying symbolic ... are parts of the code that might contain heap overflow vulnerability. This is performed through static analysis and based on the specification of heap overflow vulnerability. Then, it applies symbolic execution to the ... unit that execute the desired nodes and cause heap overflow. Finally, we use curve fitting and treatment learning ... instructions in the desired test unit, and cause heap overflow in those instructions. This method is implemented as ...

Tópico(s): Software Engineering Research

2022 - Springer Science+Business Media | Lecture notes in computer science

Artigo Acesso aberto Revisado por pares

Qintao Shen, Guozhu Meng, Kai Chen,

... the overflow. In this paper, we propose the Heap Overflow Exploitability Evaluator ( Hoee ), a new approach to automatically reveal the exploitability of heap buffer overflow vulnerabilities by evaluating proof-of-concepts (PoCs) generated ... to collect dynamic information at runtime and recover heap object layouts in a fine-grained manner. The overflow context is carefully analyzed to determine whether the ...

Tópico(s): Software Testing and Debugging Techniques

2024 - Springer Nature | Cybersecurity

Artigo Revisado por pares

И. А. Дудина, Andrey Belevantsev,

Tópico(s): Software Testing and Debugging Techniques

2017 - Pleiades Publishing | Programming and Computer Software

Artigo Revisado por pares

Julien Lupo, Katie Morrison,

... commonly used for containment of process solutions in heap leach pads, process and overflow ponds, tailings impoundments, and waste rock facilities. Geosynthetic ...

Tópico(s): Grouting, Rheology, and Soil Mechanics

2007 - Elsevier BV | Geotextiles and Geomembranes

Artigo Acesso aberto

Jon Pincus, Brian Baker,

Security vulnerabilities related to buffer overruns account for the largest share of CERT advisories, as well as high-profile worms - from the original Internet Worm in 1987 through Blaster's appearance in 2003. When malicious crackers discover a vulnerability, they devise exploits that take advantage of the vulnerability to attack a system. The article describes three powerful general-purpose families of exploits for buffer overruns: arc injection, pointer subterfuge, and heap smashing. These new ...

Tópico(s): Network Security and Intrusion Detection

2004 - Institute of Electrical and Electronics Engineers | IEEE Security & Privacy

Artigo Acesso aberto Revisado por pares

Kyung-suk Lhee, Steve J. Chapin,

... bss section) and maintain the sizes of allocated heap buffers in order to detect an actual occurrence of buffer overflow. We describe a simple implementation with which we ...

Tópico(s): Software Testing and Debugging Techniques

2003 - Wiley | Software Practice and Experience