Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,232,155 papers from all fields of science
Search
Sign In
Create Free Account
Stack buffer overflow
Known as:
Stack canary
, Stack based buffer overflow
, Smashing the stack
Expand
In software, a stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
Address space layout randomization
Buffer overflow
Call stack
Computer memory
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Dynamic Loader Oriented Programming on Linux
Julian Kirsch
,
B. Bierbaumer
,
T. Kittel
,
C. Eckert
Reversing and Offensive-Oriented Trends Symposium
2017
Corpus ID: 44357645
Memory corruptions are still the most prominent venue to attack otherwise secure programs. In order to make exploitation of…
Expand
2015
2015
Multi-task support for security-enabled embedded processors
Tedy Thomas
,
Arman Pouraghily
,
Kekai Hu
,
R. Tessier
,
T. Wolf
IEEE International Conference on Application…
2015
Corpus ID: 14541453
Embedded systems require low overhead security approaches to ensure that they are protected from attacks. In this paper, we…
Expand
2014
2014
Software Security Lecture Notes Lecture 1 : How software breaks ( native )
Thomas Nyman
2014
Corpus ID: 31219858
In order to understand how to build secure software, one must rst understand the ways in which software can be broken. The main…
Expand
2014
2014
On the Effectiveness of NX, SSP, RenewSSP, and ASLR against Stack Buffer Overflows
Hector Marco-gisbert
,
I. Ripoll
IEEE International Symposium on Network Computing…
2014
Corpus ID: 14987912
Stack Smashing Protector (SSP), Address-Space Layout Randomization (ASLR) and Non-executable (NX) are techniques for defending…
Expand
2014
2014
Lobotomy: An Architecture for JIT Spraying Mitigation
M. Jauernig
,
M. Neugschwandtner
,
Christian Platzer
,
P. M. Comparetti
Ninth International Conference on Availability…
2014
Corpus ID: 4651633
JIT spraying has an assured spot in an attacker's toolkit for Web browser exploitation: With JIT spraying an attacker is able to…
Expand
2010
2010
Binding the Daemon : FreeBSD Kernel Stack and Heap Exploitation
Patroklos argp
2010
Corpus ID: 16763353
FreeBSD is widely accepted as one of the most reliable and performance-driven operating systems currently available in both the…
Expand
2010
2010
Analysis and Research of Program Call in Stack Buffer Overflow
Zhang Zhi-liang
2010
Corpus ID: 63054865
Buffer overflows are the most serious threatens to the computer security. In this paper, according to the generation principle of…
Expand
2010
2010
Smashing the stack in 2010 Report for the Computer Security exam at the Politecnico di Torino
A. Cugliari
2010
Corpus ID: 111045033
2007
2007
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack
Asia Slowinska
,
H. Bos
Asia-Pacific Computer Systems Architecture…
2007
Corpus ID: 448331
Heap and stack buffer overflows are still among the most common attack vectors in intrusion attempts. In this paper, we ask a…
Expand
2005
2005
Buffer overflow protection based on adjusting code segment limit
Yu-an Tan
,
Ji-yan Zheng
,
Yuanda Cao
,
Xue-lan Zhang
IEEE International Symposium on Communications…
2005
Corpus ID: 17608762
Stack smashing is a common mode of buffer overflow attack for hijacking system control. A segment-based non-executable stack…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE