Corpus ID: 13128135

A Practical Dynamic Buffer Overflow Detector

@inproceedings{Ruwase2004APD,
  title={A Practical Dynamic Buffer Overflow Detector},
  author={Olatunji Ruwase and Monica S. Lam},
  booktitle={NDSS},
  year={2004}
}
  • Olatunji Ruwase, Monica S. Lam
  • Published in NDSS 2004
  • Computer Science
  • Despite previous efforts in auditing software manually and automatically, buffer overruns are still being discovered in programs in use. [...] Key Method CRED finds all buffer overrun attacks as it directly checks for the bounds of memory accesses. Unlike the original referent-object based bounds-checking technique, CRED does not break existing code because it uses a novel solution to support program manipulation of out-of-bounds addresses. Finally, by restricting the bounds checks to strings in a program, CRED…Expand Abstract

    Figures and Topics from this paper.

    Explore key concepts

    Links to highly relevant papers for key concepts in this paper:

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 337 CITATIONS, ESTIMATED 95% COVERAGE

    Eliminating Redundant Bounds Checks in Dynamic Buffer Overflow Detection Using Weakest Preconditions

    VIEW 2 EXCERPTS
    CITES BACKGROUND & METHODS

    Enhancing availability and security through boundless memory blocks

    VIEW 9 EXCERPTS
    CITES RESULTS, METHODS & BACKGROUND
    HIGHLY INFLUENCED

    A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors)

    VIEW 10 EXCERPTS
    CITES METHODS, RESULTS & BACKGROUND
    HIGHLY INFLUENCED

    FILTER CITATIONS BY YEAR

    2003
    2020

    CITATION STATISTICS

    • 43 Highly Influenced Citations

    • Averaged 11 Citations per year from 2018 through 2020

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 23 REFERENCES

    Type-Assisted Dynamic Buffer Overflow Detection

    VIEW 1 EXCERPT

    Transparent Run-Time Defense Against Stack-Smashing Attacks

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    Statically Detecting Likely Buffer Overflow Vulnerabilities

    VIEW 2 EXCERPTS

    CCured in the real world

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL

    Secure Execution via Program Shepherding

    VIEW 1 EXCERPT