Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,816,097 papers from all fields of science
Search
Sign In
Create Free Account
Stack buffer overflow
Known as:
Stack canary
, Stack based buffer overflow
, Smashing the stack
Expand
In software, a stack buffer overflow or stack buffer overrun occurs when a program writes to a memory address on the program's call stack outside of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
Address space layout randomization
Buffer overflow
Call stack
Computer memory
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Dynamic Loader Oriented Programming on Linux
Julian Kirsch
,
B. Bierbaumer
,
T. Kittel
,
C. Eckert
Reversing and Offensive-Oriented Trends Symposium
2017
Corpus ID: 44357645
Memory corruptions are still the most prominent venue to attack otherwise secure programs. In order to make exploitation of…
Expand
2015
2015
Multi-task support for security-enabled embedded processors
Tedy Thomas
,
Arman Pouraghily
,
Kekai Hu
,
R. Tessier
,
T. Wolf
IEEE International Conference on Application…
2015
Corpus ID: 14541453
Embedded systems require low overhead security approaches to ensure that they are protected from attacks. In this paper, we…
Expand
2015
2015
A highly automated binary software vulnerability risk evaluation method for off-by-one stack based buffer overflow
Ke Yan
,
Dong Liu
,
Fanzhi Meng
International Conference on Innovative Computing…
2015
Corpus ID: 14745523
Software off-by-one stack based buffer overflow vulnerability may enable attacker to execute arbitrary code via a malformed input…
Expand
2014
2014
Software Security Lecture Notes Lecture 1 : How software breaks ( native )
Thomas Nyman
2014
Corpus ID: 31219858
In order to understand how to build secure software, one must rst understand the ways in which software can be broken. The main…
Expand
2012
2012
kGuard: Lightweight Kernel Protection
V. Kemerlis
,
G. Portokalidis
,
E. Athanasopoulos
,
A. Keromytis
Login: The Usenix Magazine
2012
Corpus ID: 7619655
interests are mainly in software and systems security, with a focus on automated software Georgios Portokalidis is a postdoctoral…
Expand
2012
2012
Stack Buffer Overflow Prevention Based on Dual-stack
Zhang Danqing
2012
Corpus ID: 63987066
An analysis is made of the classical buffer overflow prevention methods for Intel 80X86 architecture and C/C++.A new stack buffer…
Expand
2010
2010
Binding the Daemon : FreeBSD Kernel Stack and Heap Exploitation
Patroklos argp
2010
Corpus ID: 16763353
FreeBSD is widely accepted as one of the most reliable and performance-driven operating systems currently available in both the…
Expand
2010
2010
Analysis and Research of Program Call in Stack Buffer Overflow
Zhang Zhi-liang
2010
Corpus ID: 63054865
Buffer overflows are the most serious threatens to the computer security. In this paper, according to the generation principle of…
Expand
2009
2009
A Compiler-Hardware Technique for Protecting Against Buffer Overflow Attacks
Eugen Leontie
,
Gedare Bloom
,
Olga Gelbart
,
B. Narahari
,
R. Simha
2009
Corpus ID: 223143
Buffer overflow attacks are widely acknowledged by computer security professionals to be one of the greatest threats to the…
Expand
2007
2007
The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack
Asia Slowinska
,
H. Bos
Asia-Pacific Computer Systems Architecture…
2007
Corpus ID: 448331
Heap and stack buffer overflows are still among the most common attack vectors in intrusion attempts. In this paper, we ask a…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE