Zobrazeno 1 - 10
of 121
pro vyhledávání: '"Heap overflow"'
Publikováno v:
Journal of Information Security. 10:177-187
The Unlink attack is a way of attacking the heap overflow vulnerability under the Linux platform. However, because the heap overflow data seldom directly leads to program control flow hijacking and related protection mechanism limitations, the existi
Publikováno v:
IEEE Access, Vol 7, Pp 186308-186318 (2019)
With the development of the Internet of Things, the security of embedded device has received extensive attention. Taint analysis technology can improve the understanding of the firmware program operating mechanism and improve the effectiveness of sec
Publikováno v:
Middleware
Persistent memory allocator is an essential component of any Non-Volatile Main Memory (NVMM) application. A slow memory allocator can bottleneck the entire application stack, while an unsecure memory allocator can render applications inconsistent upo
Autor:
Yuchao Wang, Baojiang Cui
Publikováno v:
Innovative Mobile and Internet Services in Ubiquitous Computing ISBN: 9783030503987
IMIS
IMIS
Vulnerabilities in computer software are usually caused by allowing users access to invalid memory. For example, stack overflow is to rewrite the function return address on the stack, heap overflow always use the head of the heap chunk structure to c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ff2e7bc6ff2808dcba82d57adcf87435
https://doi.org/10.1007/978-3-030-50399-4_13
https://doi.org/10.1007/978-3-030-50399-4_13
Publikováno v:
2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).
Existing vulnerability detection systems cannot effectively detect and utilize house of spirit type heap overflow vulnerabilities. This article summarizes the characteristics of the house of spirit attack, establishes a house of spirit utilization mo
Publikováno v:
ICMSS
Since static taint analysis is performed prior to execution by considering all possible execution paths, it can discover potential security issues before the program running. Currently, many taint analysis tools pay more attention to data dependence
Autor:
Jiesheng Zheng, Donghe Ni, Yiqi Hu, Jing Li, Shen Wuqiang, Yanwei Shang, Aohui Wang, Ruigang Liang
Publikováno v:
2019 International Conference on Intelligent Computing, Automation and Systems (ICICAS).
Although there are protection mechanisms like ASLR, DEP, SELinux in the Android system, they are not very effective. Although the control flow integrity scheme already has multiple schemes, some of them are protected at the source code level, some ar
Publikováno v:
CCS
We present the first approach to automatic exploit generation for heap overflows in interpreters. It is also the first approach to exploit generation in any class of program that integrates a solution for automatic heap layout manipulation. At the co
Publikováno v:
Computers & Security. 105:102246
Web-based virtual machines are one of the primary targets of attackers due to number of design flaws they contain and the connectivity provided by the Web. The design and implementation of Inscription, the first fully automated Adobe Flash binary cod
Publikováno v:
China Communications. 13:143-152
Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack, many protection methods are proposed in recent years. However, most of these existing methods focus on user-level heap o