Conferences related to Buffer Overflow

Back to Top

2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2020 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions.


2020 IEEE 18th International Conference on Industrial Informatics (INDIN)

INDIN focuses on recent developments, deployments, technology trends, and research results in Industrial Informatics-related fields from both industry and academia


2020 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


ICC 2020 - 2020 IEEE International Conference on Communications

All topics relating to existing and emerging communications networking technologies.


More Conferences

Periodicals related to Buffer Overflow

Back to Top

Automatic Control, IEEE Transactions on

The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...


Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications, IEEE Transactions on

Telephone, telegraphy, facsimile, and point-to-point television, by electromagnetic propagation, including radio; wire; aerial, underground, coaxial, and submarine cables; waveguides, communication satellites, and lasers; in marine, aeronautical, space and fixed station services; repeaters, radio relaying, signal storage, and regeneration; telecommunication error detection and correction; multiplexing and carrier techniques; communication switching systems; data communications; and communication theory. In addition to the above, ...


Computer

Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.


More Periodicals

Most published Xplore authors for Buffer Overflow

Back to Top

Xplore Articles related to Buffer Overflow

Back to Top

Realization of Buffer Overflow

2010 International Forum on Information Technology and Applications, 2010

In recent decades, the buffer overflow has been a source of many serious security issues. In recent years, by the CERT/CC (Computer Emergency Response Term/Coordination Center) issued advice on the buffer overflow vulnerability for more than accounted for 56.76%. Attack based on the buffer overflow loophole has brought serious harm to computer network. How to effectively eliminate attack based on ...


The principle and prevention of windows buffer overflow

2012 7th International Conference on Computer Science & Education (ICCSE), 2012

This paper analyzes the basic principle of buffer overflow, and describes the basic methods of using the buffer overflow to attack the computer system. Through two sections of programs, this paper shows the process of the buffer overflow and its attacking actions in details. At last, several effective countermeasures to avoid the buffer overflow attacks are discussed.


A method for detecting buffer overflow vulnerabilities

2011 IEEE 3rd International Conference on Communication Software and Networks, 2011

Buffer overflow vulnerabilities are currently the most prevalent security vulnerability. The paper presents a method that combines static analysis with dynamic test to deal with the problem on buffer overflow vulnerabilities detecting. By using the method we can identify potential weakness locations. A buffer overflow vulnerabilities testing system was developed. The experiment results tested and verified that the new methodology ...


A Checklist Based Approach for the Mitigation of Buffer Overflow Attacks

2007 Third International Conference on Wireless Communication and Sensor Networks, 2007

Buffer overflows has appear to be one of the most common problems in the area of software security. Many of the buffer overflow problems are probably the result of careless programming, which might have been found and corrected by the developers, before releasing the software. The work presented in this paper is intended to detect and prevent such buffer overflow ...


Research on Buffer Overflow Test Based on Invariant

2009 Ninth IEEE International Conference on Computer and Information Technology, 2009

Buffer overflow (BOF) is one of the major vulnerabilities that lead to non- secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying reasons of buffer overflow vary widely. This paper presents a novel method for BOF test for ANSI C language, which uses program instrumentation and mutation test technology to test the BOF vulnerabilities, on the ...


More Xplore Articles

Educational Resources on Buffer Overflow

Back to Top

IEEE-USA E-Books

  • Realization of Buffer Overflow

    In recent decades, the buffer overflow has been a source of many serious security issues. In recent years, by the CERT/CC (Computer Emergency Response Term/Coordination Center) issued advice on the buffer overflow vulnerability for more than accounted for 56.76%. Attack based on the buffer overflow loophole has brought serious harm to computer network. How to effectively eliminate attack based on the buffer overflow loophole has become a question, which everybody pays attention to. This paper first explains the concept of buffer overflow, buffer overflow principle; and then the jump instruction is given using the examples of realization of buffer overflow attacks; and finally, combined with the type of buffer overflow attacks, buffer overflow attacks, raised preventive strategies. All those must be beneficial to improving programmers' security code consciousness.

  • The principle and prevention of windows buffer overflow

    This paper analyzes the basic principle of buffer overflow, and describes the basic methods of using the buffer overflow to attack the computer system. Through two sections of programs, this paper shows the process of the buffer overflow and its attacking actions in details. At last, several effective countermeasures to avoid the buffer overflow attacks are discussed.

  • A method for detecting buffer overflow vulnerabilities

    Buffer overflow vulnerabilities are currently the most prevalent security vulnerability. The paper presents a method that combines static analysis with dynamic test to deal with the problem on buffer overflow vulnerabilities detecting. By using the method we can identify potential weakness locations. A buffer overflow vulnerabilities testing system was developed. The experiment results tested and verified that the new methodology is feasibility and availability.

  • A Checklist Based Approach for the Mitigation of Buffer Overflow Attacks

    Buffer overflows has appear to be one of the most common problems in the area of software security. Many of the buffer overflow problems are probably the result of careless programming, which might have been found and corrected by the developers, before releasing the software. The work presented in this paper is intended to detect and prevent such buffer overflow vulnerabilities. In this paper, two separate checklists are proposed to both programmers as well as test engineers for verifying the software during coding and testing phases respectively for building secure software.

  • Research on Buffer Overflow Test Based on Invariant

    Buffer overflow (BOF) is one of the major vulnerabilities that lead to non- secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying reasons of buffer overflow vary widely. This paper presents a novel method for BOF test for ANSI C language, which uses program instrumentation and mutation test technology to test the BOF vulnerabilities, on the basis of analyzing the invariants for BOF vulnerabilities. The implementation shows that it can check the attack of BOF vulnerabilities adequately and accurately, in the circumstances of no large losses in performance.

  • Buffer-Overflow Protection: The Theory

    We propose a framework for protecting against buffer overflow attacks $the oldest and most pervasive attack technique. The malicious nature of buffer- overflow attacks is the use of external data (input) as addresses (or control data). With this observation, we establish a sufficient condition for preventing buffer-overflow attacks and prove that it creates a secure system with respect to buffer-overflow attacks. The underlying concept is that input is untrustworthy, and should not be use as addresses (return addresses and function pointers). If input can be identified, buffer-overflow attacks can be caught. We used this framework to create an effective, hardware, buffer- overflow prevention tool

  • Arbitrary Copy: Bypassing Buffer-Overflow Protections

    Recent advances in buffer-overflow protection are able to eliminate several common types of buffer-overflow attacks (e.g. stack smashing, jump table). In this paper, we introduce arbitrary copy, a type of buffer-overflow attack that is capable of bypassing most buffer-overflow solutions. By overflowing both source and destination pointers of any string copy (or similar) function, arbitrary copy is able to utilize a useful local address for attacking a system. This method can bypass even the most promising buffer-overflow protection that enforces the integrity of address such as secure bit (Piromsopa and Enbody, 2006) and MINOS (Crandal and Chong, 2004). Later, we analyze conditions necessary for the success of this attack. Though satisfying all necessary conditions for this attack should be difficult, our conclusion is that it is a potential threat and requires consideration

  • The Dynamic Buffer Overflow Detection and Prevent ion Tool for Yindows Executables Using Binary Rewr iting

    This paper presents novel buffer overflow countermeasure tool for Windows portable executables at run-time. Our tool enables dynamically detecting and preventing of stack-based buffer overflow attacks for Windows applications, using binary rewriting method. Our solution protects the return address area and the previous frame pointer area of function stack frame in program stack to prevent program control flow from being changed at execution time. Protecting the return address and previous frame pointer, we have used additional stack memory area that is called safe-zone, storing original return address and previous frame pointer values. We has revised function prologue and function epilogue. The revised function prologue stores copies of the return address and the previous frame pointer values to our safe-zone, and the revised function epilogue overwrites the return address and the previous frame pointer on the stack with copies of them. The paper presents performance analysis result of our solution. The result shows that the relative performance overhead is about 1.6-2.6% and additional constant space overhead is about 25 Kbytes.

  • Buffer Overflow Exploit and Defensive Techniques

    Buffer overflow attack is most common and dangerous attack method at present. So the analysis is useful in studying the principle of buffer overflow and buffer overflow exploits. In the paper a didactic example is included to illustrate one method of buffer overflow exploits, and though adding a jmp esp instruction into the process space as a springboard, it makes the shell code successfully to be executed. Finally, an overview for protecting and defending against buffer overflow is summarized.

  • Asymptotic buffer overflow probabilities in multiclass multiplexers: an optimal control approach

    We consider a multiclass multiplexer with support for multiple service classes and dedicated buffers for each service class. Under specific scheduling policies for sharing bandwidth among these classes, we seek the asymptotic (as the buffer size goes to infinity) tail of the buffer overflow probability for each dedicated buffer. We assume dependent arrival and service processes as is usually the case in models of bursty traffic. In the standard large deviations methodology, we provide a lower and a matching (up to first degree in the exponent) upper bound on the buffer overflow probabilities. We introduce a novel optimal control approach to address these problems. In particular, we relate the lower bound derivation to a deterministic optimal control problem, which we explicitly solve. Optimal state trajectories of the control problem correspond to typical congestion scenarios. We explicitly and in detail characterize the most likely modes of overflow. We specialize our results to the generalized processor sharing policy (GPS) and the generalized longest queue first policy (GLQF). The performance of strict priority policies is obtained as a corollary. We compare the GPS and GLQF policies and conclude that GLQF achieves smaller overflow probabilities than GPS for all arrival and service processes for which our analysis holds. Our results have important implications for traffic management of high-speed networks and can be used as a basis for an admission control mechanism which guarantees a different loss probability for each class.



Standards related to Buffer Overflow

Back to Top

No standards are currently tagged "Buffer Overflow"


Jobs related to Buffer Overflow

Back to Top