咨询与建议

限定检索结果

文献类型

  • 10 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 12 篇 工学
    • 10 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 2 篇 信息与通信工程
    • 2 篇 网络空间安全
    • 1 篇 软件工程
  • 1 篇 理学
    • 1 篇 物理学

主题

  • 14 篇 buffer overflow ...
  • 2 篇 computer archite...
  • 2 篇 computer securit...
  • 2 篇 security
  • 2 篇 embedded system
  • 2 篇 aifd
  • 2 篇 api hook
  • 1 篇 universal softwa...
  • 1 篇 cyber security
  • 1 篇 duplex modem imp...
  • 1 篇 llc-layer attack
  • 1 篇 communication sy...
  • 1 篇 linux
  • 1 篇 function pointer...
  • 1 篇 microcontroller
  • 1 篇 ofdm modulation
  • 1 篇 wireless communi...
  • 1 篇 behavior pattern
  • 1 篇 osi stack
  • 1 篇 dynamic preventi...

机构

  • 2 篇 hanyang univ col...
  • 1 篇 department of co...
  • 1 篇 univ elect sci &...
  • 1 篇 florida inst tec...
  • 1 篇 natl cent univ d...
  • 1 篇 korea adv inst s...
  • 1 篇 hongik univ sch ...
  • 1 篇 univ texas dept ...
  • 1 篇 prince sattam bi...
  • 1 篇 school of comput...
  • 1 篇 warsaw univ tech...
  • 1 篇 natl cent univ d...
  • 1 篇 virginia tech ar...
  • 1 篇 college of compu...
  • 1 篇 xiamen univ dept...
  • 1 篇 univ illinois de...
  • 1 篇 hong kong polyte...

作者

  • 2 篇 ou chih-wen
  • 2 篇 chen li-han
  • 2 篇 huang cheng-hsie...
  • 2 篇 park yongsu
  • 2 篇 hsu fu-hau
  • 1 篇 ren li-yong
  • 1 篇 o'shea t.
  • 1 篇 clancy t.
  • 1 篇 xue c
  • 1 篇 nosek mateusz
  • 1 篇 kim il-hee
  • 1 篇 lin chia-jun
  • 1 篇 song yong-ho
  • 1 篇 lu xian-liang
  • 1 篇 xiao b
  • 1 篇 zhang shengzhi
  • 1 篇 xian-liang lu
  • 1 篇 cabaj krzysztof
  • 1 篇 carlson c.
  • 1 篇 sha ehm

语言

  • 14 篇 英文
检索条件"主题词=buffer overflow attack"
14 条 记 录,以下是1-10 订阅
排序:
Experimental Evaluation of the Defense Capability of ARM-based Systems against buffer overflow attacks in Wireless Networks  10
Experimental Evaluation of the Defense Capability of ARM-bas...
收藏 引用
10th IEEE International Conference on Electronics Information and Emergency Communication (IEEE ICEIEC)
作者: Zhou, Sun Chen, Jun Xiamen Univ Dept Automat Xiamen 361005 Fujian Peoples R China
buffer overflow attack is one of the mainstream attacks towards the ARM architecture. It may lead to consequences such as program failure or system privileges loss. The mainstream operating systems deploy multiple def... 详细信息
来源: 评论
Trusted dynamic measurement scheme against buffer overflow attack
Trusted dynamic measurement scheme against buffer overflow a...
收藏 引用
2014 International Conference on Communication Technology and Application(CTA2014)
作者: L.B.Zeng R.H.Zhang Y.Song School of Computer Science and Technology Shandong University
In trusted computing, trusted measurement is a fundamental technology. Whether the measurement results can correctly represent the status of computer system will influence the effect of trusted authentication between ... 详细信息
来源: 评论
Compromising an IoT device based on Harvard-architecture microcontroller
Compromising an IoT device based on Harvard-architecture mic...
收藏 引用
SPIE-IEEE-PSP WILGA on Photonics Applications in Astronomy, Communications, Industry, and High-Energy Physics Experiments
作者: Cabaj, Krzysztof Mazur, Grzegorz Nosek, Mateusz Warsaw Univ Technol Inst Comp Sci Nowowiejska 15-19 PL-00665 Warsaw Poland
The paper describes the concept and implementation of an attack technique, targeting an Internet-connected device based on Arduino family board and modules with an ATmega microcontoller. Due to Harvard-like architectu... 详细信息
来源: 评论
A Mathematical Model of Mitigating Memory Randomization Weakness via Moving Target Defense
A Mathematical Model of Mitigating Memory Randomization Weak...
收藏 引用
International Conference on Computational Science and Computational Intelligence (CSCI)
作者: Aldossary, Sultan Allen, William Zhang, Shengzhi Florida Inst Technol Sch Comp Melbourne FL 32901 USA Prince Sattam Bin Abdulaziz Univ Al Kharj Saudi Arabia
The address space randomization technique was proposed to make determining the address of a shared library more difficult since each instance of the program is loaded into a random base address. However, when address ... 详细信息
来源: 评论
A Behavior-based buffer overflow attack Blocker
收藏 引用
电脑知识与技术 2010年 第4期6卷 2544-2549页
作者: ZHANG Li-yuan Jin Li Department of Computer Science and Technology Tongji University Shanghai 201804 China
A common way to gain control of victim hosts is to launch buffer overflow attacks by remote *** paper proposes a behavior-based buffer overflow attacker blocker,which can dynamically detect and prevent remote buffer o... 详细信息
来源: 评论
Demonstrated LLC-Layer attack and Defense Strategies for Wireless Communication Systems
Demonstrated LLC-Layer Attack and Defense Strategies for Wir...
收藏 引用
IEEE Conference on Communications and Network Security (CNS)
作者: Hitefield, S. Nguyen, V. Carlson, C. O'Shea, T. Clancy, T. Virginia Tech Arlington VA 22203 USA
In this work we demonstrate an over-the-air capability to exploit software weaknesses in the signal processing code implementing the physical and link layers of the OSI stack. Our test bed includes multiple nodes leve... 详细信息
来源: 评论
A Robust Kernel-Based Solution to Control-Hijacking buffer overflow attacks
收藏 引用
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 2011年 第3期27卷 869-890页
作者: Chen, Li-Han Hsu, Fu-Hau Huang, Cheng-Hsien Ou, Chih-Wen Lin, Chia-Jun Liu, Szu-Chi Natl Cent Univ Dept Comp Sci & Informat Engn Tao Yuan 320 Taiwan
In this paper, we propose a robust kernel-based solution, called AURORA, to a ubiquitous security problem - control-hijacking buffer overflow attacks (BOAs). AURORA utilizes either the addresses of the buffers storing... 详细信息
来源: 评论
AIFD: A runtime solution to buffer overflow attack
AIFD: A runtime solution to buffer overflow attack
收藏 引用
6th International Conference on Machine Learning and Cybernetics
作者: Han, Hong Lu, Xian-Liang Ren, Li-Yong Chen, Bo Yang, Ning Univ Elect Sci & Technol China Coll Comp Sci & Engn Chengdu 610054 Peoples R China
While buffer overflow problem has been known for a long time, it continues to present a serious security threat. Many solutions to the notorious problem were proposed. However, they had,their own-drawbacks. This paper... 详细信息
来源: 评论
AIFD: A RUNTIME SOLUTION TO buffer overflow attack
AIFD: A RUNTIME SOLUTION TO BUFFER OVERFLOW ATTACK
收藏 引用
2007 International Conference on Machine Learning and Cybernetics(IEEE第六届机器学习与控制论国际会议)
作者: HONG HAN XIAN-LIANG LU LI-YONG REN BO CHEN NING YANG College of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 610054
While buffer overflow problem has been known for a long time, it continues to present a serious security *** solutions to the notorious problem were ***, they had their own *** paper presents a solution called API inv... 详细信息
来源: 评论
HSP: A solution against heap sprays
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2010年 第11期83卷 2227-2236页
作者: Hsu, Fu-Hau Huang, Cheng-Hsien Hsu, Chi-Hsien Ou, Chih-Wen Chen, Li-Han Chiu, Ping-Cheng Natl Cent Univ Dept Comp Sci & Informat Engn Tao Yuan 32001 Taiwan
Heap sprays are a new buffer overflow attack (BOA) form that can significantly increase the successful chance of a BOA even though the attacked process is protected by a lot of state-of-the-art anti-BOA mechanisms, su... 详细信息
来源: 评论