Buffer overflow protection

Known as: StackGhost, Canary value, Guard page 
Buffer overflow protection is any of various techniques used during software development to enhance the security of executable programs by detecting… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1998-2018
024619982018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
In software coding practices, buffer overflow is most frequently used as a means of intrusion. Typically, an attacker is able to… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
Piromsopa and Enbody (2006) proposed Secure Bit, an architectural approach to protect against buffer-overflow attacks on control… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
2008
2008
Despite having been around for more than 25 years, buffer overflow attacks are still a major security threat for deployed… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2006
2006
We propose a framework for protecting against buffer overflow attacks $the oldest and most pervasive attack technique. The… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 4
Is this relevant?
2006
2006
We propose a minimalist, architectural approach, Secure Bit (patent pending), to protect against buffer overflow attacks on… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2006
2006
Recent advances in buffer-overflow protection are able to eliminate several common types of buffer-overflow attacks (e.g. stack… (More)
  • figure 1
  • figure 3
  • figure 2
Is this relevant?
2004
2004
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects… (More)
  • figure 1
  • figure 3
  • figure 5
  • figure 4
  • figure 6
Is this relevant?
2004
2004
Although many defense mechanisms against buffer overflow attacks have been proposed, buffer overflow vulnerability in software is… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 4
  • figure 6
Is this relevant?
2004
2004
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than first-class objects. The… (More)
  • figure 3.1
  • figure 4.1
  • figure 4.2
  • figure 4.4
  • figure 5.2
Is this relevant?
Highly Cited
1998
Highly Cited
1998
This paper presents a systematic solution to the persistent problem of buffer overflow attacks. Buffer overflow attacks gained… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?