Skip to search formSkip to main contentSkip to account menu

Stack buffer overflow

Known as: Stack canary, Stack based buffer overflow, Smashing the stack 
In software, a stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Memory corruptions are still the most prominent venue to attack otherwise secure programs. In order to make exploitation of… 
2015
2015
Embedded systems require low overhead security approaches to ensure that they are protected from attacks. In this paper, we… 
2014
2014
In order to understand how to build secure software, one must rst understand the ways in which software can be broken. The main… 
2014
2014
Stack Smashing Protector (SSP), Address-Space Layout Randomization (ASLR) and Non-executable (NX) are techniques for defending… 
2014
2014
JIT spraying has an assured spot in an attacker's toolkit for Web browser exploitation: With JIT spraying an attacker is able to… 
2010
2010
FreeBSD is widely accepted as one of the most reliable and performance-driven operating systems currently available in both the… 
2010
2010
Buffer overflows are the most serious threatens to the computer security. In this paper, according to the generation principle of… 
2007
2007
Heap and stack buffer overflows are still among the most common attack vectors in intrusion attempts. In this paper, we ask a… 
2005
2005
Stack smashing is a common mode of buffer overflow attack for hijacking system control. A segment-based non-executable stack…