Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Buffer overflow protection

Known as: StackGhost, Canary value, Guard page 
Buffer overflow protection is any of various techniques used during software development to enhance the security of executable programs by detecting… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20… Expand
  • figure 3
  • figure 4
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
2009
2009
Buffer overflow has become a major source of network security vulnerability. Traditional schemes for detecting buffer overflow… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2008
2008
Despite having been around for more than 25 years, buffer overflow attacks are still a major security threat for deployed… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2006
2006
Bugs in dynamic memory management, including for instance heap-based buffer overflows and dangling pointers, are an important… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2006
2006
We propose a minimalist, architectural approach, Secure Bit (patent pending), to protect against buffer overflow attacks on… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2005
2005
The capabilities of seven dynamic buffer overflow detection tools (Chaperon, Valgrind, CCured, CRED, Insure++, ProPolice and… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects… Expand
  • figure 1
  • figure 3
  • figure 5
  • figure 4
  • figure 6
Is this relevant?
2004
2004
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This paper presents a systematic solution to the persistent problem of buffer overflow attacks. Buffer overflow attacks gained… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
1969
Highly Cited
1969
To ascertain the truth of a sentence such as “A canary can fly,” people utilize long-term memory. Consider two possible… Expand
Is this relevant?