Buffer overflow and format string overflow vulnerabilities

@article{Lhee2003BufferOA,
  title={Buffer overflow and format string overflow vulnerabilities},
  author={Kyung-suk Lhee and Steve J. Chapin},
  journal={Softw., Pract. Exper.},
  year={2003},
  volume={33},
  pages={423-460}
}
Buffer overflow vulnerabilities are among the most widespread of security problems. Numerous incidents of buffer overflow attacks have been reported and many solutions have been proposed, but a solution that is both complete and highly practical is yet to be found. Another kind of vulnerability called format string overflow has recently been found, and though not as popular as buffer overflow, format string overflow attacks are no less dangerous. This article surveys representative techniques… CONTINUE READING
BETA

Citations

Publications citing this paper.
SHOWING 1-10 OF 52 CITATIONS

CPM: Masking Code Pointers to Prevent Code Injection Attacks

  • ACM Trans. Inf. Syst. Secur.
  • 2013
VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

A New Class of Buffer Overflow Attacks

  • 2011 31st International Conference on Distributed Computing Systems
  • 2011
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Realization of Buffer Overflow

  • 2010 International Forum on Information Technology and Applications
  • 2010
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Static Analysis of Format String Vulnerabilities

  • 2011 First ACIS International Symposium on Software and Network Engineering
  • 2011
VIEW 3 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

A New Detection Method for Stack Overflow Vulnerability Based on Component Binary Code for Third-Party Component

  • 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)
  • 2018
VIEW 1 EXCERPT
CITES BACKGROUND

Guiding Software Evolution with Binary Diversity

  • NAECON 2018 - IEEE National Aerospace and Electronics Conference
  • 2018
VIEW 2 EXCERPTS
CITES BACKGROUND & METHODS

Low-Level Memory Attacks on Automotive Embedded Systems

  • 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)
  • 2018

FILTER CITATIONS BY YEAR

2004
2018

CITATION STATISTICS

  • 5 Highly Influenced Citations

  • Averaged 5 Citations per year over the last 3 years

  • 50% Increase in citations per year in 2018 over 2017

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…