J. T. Vigne, Max Blumenthai, T. W. Smartt,
... Club Picnic, Floods in France Rhone and Loire Overflow, Charter Policy Directors at Bulawayo, American Mails Disembarkation ... W. Butler's Warning, Trouble on a Debris Heap Debris=Washers Charged with Assault, Moors Punished Villages ...
1907 - Gale Group | NCCO EuropeAfrica
Ning Huang, Shuguang Huang, Chao Chang,
Heap overflow is a common error of buffer overflow in Linux. The control flow of a program may ... by checking the control flow state. However, the heap overflow data rarely lead to a control flow hijacking ... It is difficult to analyze the exploitability of heap overflow automatically through the existing analysis technology. For the heap overflow errors in Linux, we summarize the features of ... building the detection model of the exploitability of heap overflow, and proposing a method for analyzing the exploitability ...
Tópico(s): Software Testing and Debugging Techniques
2019 - IOP Publishing | IOP Conference Series Earth and Environmental Science
Nick Nikiforakis, Frank Piessens, Wouter Joosen,
... little attention and thus today, the problem of heap overflows is largely unsolved. In this paper we present HeapSentry, a system designed to detect and stop heap overflow attacks through the cooperation of the memory allocation library of a program and the operating system's kernel. HeapSentry places unique random canaries at the end of each heap object which are later checked by the kernel, ...
Tópico(s): Diamond and Carbon-based Materials Research
2013 - Springer Science+Business Media | Lecture notes in computer science
Shih-Kun Huang, Min-Hsiang Huang, Po-Yen Huang, Han-Lin Lu, Chung-Wei Lai,
... can deal with vulnerability types including stack and heap overflows, format string, and the use of uninitialized variables. ... 211 times faster than the initial attempt. For heap overflow vulnerability, we can automatically exploit the unlink() macro ...
Tópico(s): Advanced Malware Detection Techniques
2014 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Reliability
... to memory corruption vulnerabilities such as buffer overflows, heap overflows, etc. Several techniques have been developed to defend ...
Tópico(s): Diamond and Carbon-based Materials Research
2008 - Springer Science+Business Media | Lecture notes in computer science
R. Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu Upadhyaya,
... layout of a process in a buffer or heap overflow attack. In this paper, we present an analysis ...
Tópico(s): Advanced Malware Detection Techniques
2004 - Springer Science+Business Media | Lecture notes in computer science
El Habib Boudjema, Sergey Verlan, Lynda Mokdad, Christèle Faure,
... vulnerabilities are considered (taint related, stack overflow, and heap overflow). Based on the angr framework as a supporting ...
Tópico(s): Software Testing and Debugging Techniques
2019 - Wiley | Security and Privacy
Qiang Zeng, Dinghao Wu, Peng Liu,
... case study, software cruising is applied to the heap buffer overflow problem. Previous mitigation and detection techniques for this ... tedious manual program transformation. We present a concurrent heap buffer overflow detector, Cruiser, in which a concurrent thread is added to the user program to monitor heap integrity, and custom lock-free data structures and ...
Tópico(s): Parallel Computing and Optimization Techniques
2011 - Association for Computing Machinery | ACM SIGPLAN Notices
... and lack of virtual memory. Memory (stack and heap) overflow problems occur in such software components because of ...
Tópico(s): Distributed systems and fault tolerance
2009 - University of Giessen | Journal of automata, languages and combinatorics
Xavier Allamigeon, Charles Hymans,
Tópico(s): Formal Methods in Verification
2007 - Springer Nature | Journal in Computer Virology
Donghai Tian, Xuanya Li, Mo Chen, Changzhen Hu,
Heap buffer overflow has been extensively studied for many years, but it remains a severe threat to software security. ... In this paper, we present iCruiser, an efficient heap buffer overflow monitoring system that uses the multi-core technology. ... with existing programs, and it can detect the heap buffer overflows concurrently. Compared with the latest heap protection systems, ... security guarantees. Experiments show that iCruiser can detect heap buffer overflow attacks effectively with a little performance overhead.
Tópico(s): Diamond and Carbon-based Materials Research
2014 - Institute of Electronics, Information and Communication Engineers | IEICE Transactions on Information and Systems
Yuzhu Ren, Weiyu Dong, Jian Lin, Xinliang Miao,
... programs and detect vulnerabilities such as stack overflow, heap overflow and so on. Finally, we verify our prototype ...
Tópico(s): Software Testing and Debugging Techniques
2019 - Institute of Electrical and Electronics Engineers | IEEE Access
Surupa Biswas, Thomas W. Carley, Matthew Simpson, Bhuvan Middha, Rajeev Barua,
... methods are able to grow the stack or heap beyond its overflow by an amount that varies widely by application---the amount of recovered space ranges from 0.7 to 93.5% of the combined stack and heap size.
Tópico(s): Radiation Effects in Electronics
2006 - Association for Computing Machinery | ACM Transactions on Embedded Computing Systems
Donghai Tian, Xiaoqi Jia, Junhua Chen, Changzhen Hu, Jingfeng Xue,
Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To ... of these existing methods focus on user-level heap overflow detection. Only a few methods are proposed for ... evaluations show that our system can detect kernel heap overflow attacks effectively with minimal performance cost.
Tópico(s): Advanced Malware Detection Techniques
2016 - Institute of Electrical and Electronics Engineers | China Communications
Yves Younan, Wouter Joosen, Frank Piessens,
Tópico(s): Cryptographic Implementations and Security
2006 - Springer Science+Business Media | Lecture notes in computer science
Francesco Gadaleta, Yves Younan, Wouter Joosen,
... that combines the notoriously hard to reliably exploit heap-based buffer overflow with the use of an in-browser scripting language for improved reliability. A typical heap-spraying attack allocates a high number of objects ...
Tópico(s): Web Application Security Vulnerabilities
2010 - Springer Science+Business Media | Lecture notes in computer science
Emery D. Berger, Benjamin G. Zorn,
... a wide range of memory errors, including a heap-based buffer overflow in an actual application.
Tópico(s): Security and Verification in Computing
2006 - Association for Computing Machinery | ACM SIGPLAN Notices
Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis,
... augment source code to dynamically catch stack and heap-based buffer overflow and underflow attacks, and recover from them by allowing the program to continue execution. Our hypothesis is that we can ...
Tópico(s): Distributed systems and fault tolerance
2005 - Springer Science+Business Media | Lecture notes in computer science
Alexandra Boldyreva, Taesoo Kim, Richard Lipton, Bogdan Warinschi,
... remote memory attestation; we concentrate on provably detecting heap-based overflow attacks and consider the setting where we aim to protect the memory in a remote system. We present two protocols offering various efficiency and security trade-offs (but all solutions are efficient enough for practical use as our implementation shows) that detect the presence of injected malicious code or data in remotely-stored heap memory. While our solutions offer protection only against ...
Tópico(s): Digital and Cyber Forensics
2016 - Springer Science+Business Media | Lecture notes in computer science
Stelios Sidiroglou, Angelos D. Keromytis,
... augment source code to dynamically catch stack and heap-based buffer overflow and underflow attacks, and recover from them by allowing the program to continue execution. Our hypothesis is that we can ...
Tópico(s): Advanced Malware Detection Techniques
2006 - Springer Science+Business Media | International Journal of Information Security
Maryam Mouzarani, Babak Sadeghiyan, Mohammad Zolfaghari,
... heap‐based vulnerabilities in executable codes, that is, heap‐based buffer overflow, buffer underwrite, buffer over‐read, buffer under‐read, ...
Tópico(s): Advanced Malware Detection Techniques
2016 - Hindawi Publishing Corporation | Security and Communication Networks
Fadi Yilmaz, Meera Sridhar, Abhinav Mohanty, Vasant Tendulkar, Kevin W. Hamlen,
... 3) integer overflow, (4) buffer overflow, or (5) heap overflow vulnerability sub-classes. To improve web vulnerability analysis ...
Tópico(s): Web Application Security Vulnerabilities
2021 - Elsevier BV | Computers & Security
Misha Zitser, Richard P. Lippmann, Tim Leek,
... and a "OK" case without buffer overflows. Buffer overflows varied and included stack, heap, bss and data buffers; access above and below ...
Tópico(s): Software Reliability and Analysis Research
2004 - Association for Computing Machinery | ACM SIGSOFT Software Engineering Notes
Duc-Hiep Chu, Joxan Jaffar, Rasool Maghareh,
... result, the need to develop methods to avoid heap overflow errors in safety-critical embedded systems has increased. ...
Tópico(s): Embedded Systems Design Techniques
2016 - Association for Computing Machinery | ACM SIGPLAN Notices
Maryam Mouzarani, Ali Kamali, Sara Baradaran, Mahdi Heidari,
... improving the efficiency of symbolic execution and detecting heap overflow vulnerability in executable codes. Instead of applying symbolic ... are parts of the code that might contain heap overflow vulnerability. This is performed through static analysis and based on the specification of heap overflow vulnerability. Then, it applies symbolic execution to the ... unit that execute the desired nodes and cause heap overflow. Finally, we use curve fitting and treatment learning ... instructions in the desired test unit, and cause heap overflow in those instructions. This method is implemented as ...
Tópico(s): Software Engineering Research
2022 - Springer Science+Business Media | Lecture notes in computer science
Qintao Shen, Guozhu Meng, Kai Chen,
... the overflow. In this paper, we propose the Heap Overflow Exploitability Evaluator ( Hoee ), a new approach to automatically reveal the exploitability of heap buffer overflow vulnerabilities by evaluating proof-of-concepts (PoCs) generated ... to collect dynamic information at runtime and recover heap object layouts in a fine-grained manner. The overflow context is carefully analyzed to determine whether the ...
Tópico(s): Software Testing and Debugging Techniques
2024 - Springer Nature | Cybersecurity
И. А. Дудина, Andrey Belevantsev,
Tópico(s): Software Testing and Debugging Techniques
2017 - Pleiades Publishing | Programming and Computer Software
... commonly used for containment of process solutions in heap leach pads, process and overflow ponds, tailings impoundments, and waste rock facilities. Geosynthetic ...
Tópico(s): Grouting, Rheology, and Soil Mechanics
2007 - Elsevier BV | Geotextiles and Geomembranes
Security vulnerabilities related to buffer overruns account for the largest share of CERT advisories, as well as high-profile worms - from the original Internet Worm in 1987 through Blaster's appearance in 2003. When malicious crackers discover a vulnerability, they devise exploits that take advantage of the vulnerability to attack a system. The article describes three powerful general-purpose families of exploits for buffer overruns: arc injection, pointer subterfuge, and heap smashing. These new ...
Tópico(s): Network Security and Intrusion Detection
2004 - Institute of Electrical and Electronics Engineers | IEEE Security & Privacy
Kyung-suk Lhee, Steve J. Chapin,
... bss section) and maintain the sizes of allocated heap buffers in order to detect an actual occurrence of buffer overflow. We describe a simple implementation with which we ...
Tópico(s): Software Testing and Debugging Techniques
2003 - Wiley | Software Practice and Experience