咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 4 篇 会议
  • 3 篇 学位论文

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 7 篇 工学
    • 6 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 3 篇 软件工程
    • 1 篇 信息与通信工程
  • 1 篇 理学
    • 1 篇 物理学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 11 篇 buffer overflow ...
  • 3 篇 buffer overflow ...
  • 2 篇 honeypot
  • 2 篇 škodlivý softwar...
  • 2 篇 zero day útoky
  • 2 篇 text
  • 2 篇 zero day attacks
  • 2 篇 malware
  • 2 篇 ids
  • 1 篇 intrusion detect...
  • 1 篇 clustering
  • 1 篇 udp
  • 1 篇 function call in...
  • 1 篇 ips
  • 1 篇 dynamic linking
  • 1 篇 secure coding
  • 1 篇 probing attacks
  • 1 篇 supervised machi...
  • 1 篇 nids
  • 1 篇 ddos

机构

  • 3 篇 brno university ...
  • 1 篇 mitsubishi elect...
  • 1 篇 penn state univ ...
  • 1 篇 mohammed v univ ...
  • 1 篇 harbin univ sci ...
  • 1 篇 ftw telecommun r...
  • 1 篇 nii jfli
  • 1 篇 penn state univ ...
  • 1 篇 beijing city uni...
  • 1 篇 indian inst tech...
  • 1 篇 tohoku univ aoba...
  • 1 篇 ibn tofail univ ...
  • 1 篇 carnegie mellon ...
  • 1 篇 ntt corp ntt sec...
  • 1 篇 univ texas dept ...
  • 1 篇 univ toulouse cn...
  • 1 篇 indian inst tech...

作者

  • 2 篇 homoliak ivan
  • 1 篇 takahashi junko
  • 1 篇 pan chi-chun
  • 1 篇 nashimoto shoei
  • 1 篇 zhai j. q.
  • 1 篇 zhou y. y.
  • 1 篇 šulák ladislav
  • 1 篇 aoki takafumi
  • 1 篇 hayashi yu-ichi
  • 1 篇 reddy kommuru al...
  • 1 篇 wang xinran
  • 1 篇 abdellaoui abder...
  • 1 篇 eddine jamai bad...
  • 1 篇 gupta prateek
  • 1 篇 homma naofumi
  • 1 篇 casas pedro
  • 1 篇 avijit kumar
  • 1 篇 gupta deepak
  • 1 篇 owezarski philip...
  • 1 篇 rebeiro chester

语言

  • 11 篇 英文
检索条件"主题词=Buffer overflow attacks"
11 条 记 录,以下是1-10 订阅
排序:
The random forests model of detecting network-based buffer overflow attacks  3rd
The random forests model of detecting network-based buffer o...
收藏 引用
3rd International Conference of Electronic Engineering and Information Science (ICEEIS)
作者: Zhai, J. Q. Zhou, Y. Y. Harbin Univ Sci & Technol Sch Comp Sci & Technol Harbin Heilongjiang Peoples R China
buffer overflows are a common type of network intrusion attack that continue to plague the networked community. This paper investigated the use of Random Forests, an ensemble technique that creates multiple decision t... 详细信息
来源: 评论
Study on the Principle and Defense of buffer overflow attacks
Study on the Principle and Defense of Buffer Overflow Attack...
收藏 引用
4th International Conference on Graphic and Image Processing (ICGIP)
作者: Lin, Wang Beijing City Univ Network Informat Ctr Beijing Peoples R China
buffer overflow attacks have been the most common form in the network attacks and become a predominant problem in the system and network security area. With specific programs, this paper describes in detail the type o... 详细信息
来源: 评论
SigFree: A Signature-Free buffer overflow Attack Blocker
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2010年 第1期7卷 65-79页
作者: Wang, Xinran Pan, Chi-Chun Liu, Peng Zhu, Sencun Penn State Univ Dept Comp Sci & Engn State Coll PA 16802 USA Penn State Univ Coll Informat Sci & Technol State Coll PA 16802 USA
We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet services such as web service. Motivated by... 详细信息
来源: 评论
buffer overflow attack with multiple fault injection and a proven countermeasure
收藏 引用
JOURNAL OF CRYPTOGRAPHIC ENGINEERING 2017年 第1期7卷 35-46页
作者: Nashimoto, Shoei Homma, Naofumi Hayashi, Yu-ichi Takahashi, Junko Fuji, Hitoshi Aoki, Takafumi Mitsubishi Electr Corp Informat Technol R&D Ctr 5-1-1Ofuna Kamakura Kanagawa 2478501 Japan Tohoku Univ Aoba Ku 6-6-05 Aramaki Aza Aoba Sendai Miyagi 9808579 Japan NTT Corp NTT Secure Platform Labs 3-9-11 Midori-Cho Tokyo 1808585 Japan
In this paper, we present a hardware/software coattack to hijack a program flow on microcontrollers. The basic idea is to skip a few instructions using multiple fault injection in microcontrollers in cooperation with ... 详细信息
来源: 评论
Metriky pro detekci buffer-overflow útoků na UDP síťové služby
Metriky pro detekci buffer-overflow útoků na UDP síťové...
收藏 引用
作者: Šulák, Ladislav Brno University of Technology
Tato práce se zabývá problematikou síťových útoků a jich detekcí v síťovém provozu. Cílem práce je navrhnout takovou sadu metrik, která popisuje síťov&#... 详细信息
来源: 评论
Binary rewriting and call interception for efficient runtime protection against buffer overflows
收藏 引用
SOFTWARE-PRACTICE & EXPERIENCE 2006年 第9期36卷 971-998页
作者: Avijit, Kumar Gupta, Prateek Gupta, Deepak Indian Inst Technol Dept Comp Sci & Engn Kanpur 208016 Uttar Pradesh India Carnegie Mellon Univ Dept Comp Sci Pittsburgh PA 15213 USA Univ Texas Dept Comp Sci Austin TX 78712 USA
buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most existing solutions for avoiding buffer overflows are either inadequate, inefficient or incom... 详细信息
来源: 评论
PwnShield: An Automated Approach to Detect and Exploit buffer overflows and Bypassing Modern Mitigation Techniques  3rd
PwnShield: An Automated Approach to Detect and Exploit Buffe...
收藏 引用
3rd International Conference on Advanced Network Technologies and Intelligent Computing (ANTIC)
作者: Eddine, Jamai Badr Abdellaoui, Abderrahim Anass, Bouchnafa Ibn Tofail Univ Engn Sci Lab ENSA Kenitra Morocco Mohammed V Univ Engn Sci Lab ENSIAS Rabat Morocco
In the dynamic realm of cybersecurity, the perpetual struggle between security systems and malicious exploits persists. Among these threats, buffer overflow vulnerabilities remain a persistent challenge continually ad... 详细信息
来源: 评论
Coping with 0-Day attacks through Unsupervised Network Intrusion Detection  10
Coping with 0-Day Attacks through Unsupervised Network Intru...
收藏 引用
10th International Wireless Communications & Mobile Computing Conference (IWCMC)
作者: Casas, Pedro Mazel, Johan Owezarski, Philippe FTW Telecommun Res Ctr Vienna Austria NII JFLI Tokyo Japan Univ Toulouse CNRS LAAS Toulouse France
Traditional Network Intrusion Detection Systems (NIDSs) rely on either specialized signatures of previously seen attacks, or on expensive and difficult to produce labeled traffic datasets for profiling and training. B... 详细信息
来源: 评论
Metriky pro detekci útoků v síťovém provozu
Metriky pro detekci útoků v síťovém provozu
收藏 引用
作者: Homoliak, Ivan Brno University of Technology
Práce se zabývá návrhem a aplikací nových metrik pro detekci útoků v síťovém provozu na základě analýz již existujících metrik, analýz síťov&... 详细信息
来源: 评论
Detekce Útoků v Síťovém Provozu
Detekce Útoků v Síťovém Provozu
收藏 引用
作者: Homoliak, Ivan Brno University of Technology
Tato práce se zabývá problematikou anomální detekce síťových útoků s využitím technik strojového učení. Nejdříve jsou prezentovány state-of-the-art dato... 详细信息
来源: 评论