IEEE Organizations related to Buffer Overflows

Back to Top

No organizations are currently tagged "Buffer Overflows"



Conferences related to Buffer Overflows

Back to Top

2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC)

IEEE CCNC 2020 will present the latest developments and technical solutions in the areas of home networking, consumer networking, enabling technologies (such as middleware) and novel applications and services. The conference will include a peer-reviewed program of technical sessions, special sessions, business application sessions, tutorials, and demonstration sessions.


2020 IEEE 18th International Conference on Industrial Informatics (INDIN)

INDIN focuses on recent developments, deployments, technology trends, and research results in Industrial Informatics-related fields from both industry and academia


2020 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


ICC 2020 - 2020 IEEE International Conference on Communications

All topics relating to existing and emerging communications networking technologies.


2019 14th International Wireless Communications and Mobile Computing Conference (IWCMC)

IWCMC 2019 will target a wide spectrum of the state-of-the-art as well as emerging topics pertaining to wireless networks, wireless sensors, vehicular communications, and mobile computing.


More Conferences

Periodicals related to Buffer Overflows

Back to Top

No periodicals are currently tagged "Buffer Overflows"


Most published Xplore authors for Buffer Overflows

Back to Top

Xplore Articles related to Buffer Overflows

Back to Top

Dual Port Sram - Data In Buffer

Dual Port Sram - Data In Buffer, 12/15/2011

Course content reaffirmed: 06/2015--There are several important timings that must be considered when designing the Data In Buffer that go beyond amplifying the input signal to drive the data to be written into the bit cell. The control timing must be such that the hold time for data in from the customer can be zero and not cause a change ...


Dual Port SRAM - Data Out Buffer

Dual Port SRAM - Data Out Buffer, 09/15/2011

Course content reaffirmed: 06/2015--There are several important features required for how the data output is controlled and how it drives the data out pin that the customer connects to. This Dual Port tutorial describes the design of the Data Output Buffer and how it is used to latch the data out and hold it valid even into the next cycle. ...


An Architectural-Enhanced Secure Design in Embedded System

2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS), 2018

In order to resist software attack (such as buffer overflow) and hardware attack of embedded system, this paper presents a series of novel architectural-enhanced security solutions, including tracing the crucial process of execution behavior, cryptographic algorithm and integrity schemes for memory authentication and secure tag validation. The design is implemented on an actual FPGA platform. The experimental result shows that ...


An Efficient Mutation-Based Fuzz Testing Approach for Detecting Flaws of Network Protocol

2012 International Conference on Computer Science and Service System, 2012

Security flaws existed in protocol implementations might be exploited by malicious attackers and the consequences can be very serious. Therefore, detecting vulnerabilities of network protocol implementations is becoming a hot research topic recently. However, protocol security test is a very complex, challenging and error-prone task, as constructing test packets manually or randomly are not practical. This paper presents an efficient ...


Implementation of adaptive binary exponential backoff (ABEB) algorithm with dynamical sizing buffer for load-balanced RPL

2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN), 2014

In RPL the pair wise metric may result in a single node with good transmission quality, linked to many neighboring nodes which are associated with a large number of children nodes. In this case, for one DODAG the parent node can be severely congested which results in a large number of packets drop due to buffer limitation on the parent ...


More Xplore Articles

Educational Resources on Buffer Overflows

Back to Top

IEEE-USA E-Books

  • Dual Port Sram - Data In Buffer

    Course content reaffirmed: 06/2015--There are several important timings that must be considered when designing the Data In Buffer that go beyond amplifying the input signal to drive the data to be written into the bit cell. The control timing must be such that the hold time for data in from the customer can be zero and not cause a change on the pin to propagate all the way to the bit cell and disturb what was just written. This tutorial makes a deeper evaluation of the timing paths that must be considered between clock and data in.

  • Dual Port SRAM - Data Out Buffer

    Course content reaffirmed: 06/2015--There are several important features required for how the data output is controlled and how it drives the data out pin that the customer connects to. This Dual Port tutorial describes the design of the Data Output Buffer and how it is used to latch the data out and hold it valid even into the next cycle. Special pre-charge functions are designed into the buffer to allow for easy ripple thru of data to the output once the sense amp asserts but still will latch and hold the data after it goes back into pre-charge. The design of other features such as the use of OEZ to control when the output is in high Z is discussed. Schematics and waveforms from SPICE simulations will be presented, and the complete read path from when the word line asserts to the output of data at the pin will be evaluated.

  • An Architectural-Enhanced Secure Design in Embedded System

    In order to resist software attack (such as buffer overflow) and hardware attack of embedded system, this paper presents a series of novel architectural-enhanced security solutions, including tracing the crucial process of execution behavior, cryptographic algorithm and integrity schemes for memory authentication and secure tag validation. The design is implemented on an actual FPGA platform. The experimental result shows that this design can eliminate a wide range of software and hardware attacks with low performance loss and minimal resource overheads.

  • An Efficient Mutation-Based Fuzz Testing Approach for Detecting Flaws of Network Protocol

    Security flaws existed in protocol implementations might be exploited by malicious attackers and the consequences can be very serious. Therefore, detecting vulnerabilities of network protocol implementations is becoming a hot research topic recently. However, protocol security test is a very complex, challenging and error-prone task, as constructing test packets manually or randomly are not practical. This paper presents an efficient mutation-based approach for detecting implementation flaws of network protocol. Compared with other protocol testing tools, our approach divides the procedure of protocol testing into many phases, and flexible design can cover many testing cases for the protocol implementations under testing, and could apply for testing various protocol implementations quite easily. Besides, this approach is more comprehensible that makes the protocol security test easier to carry out. To assess the usefulness of this approach, several experiments are performed on four FTP server implementations and the results showed that our approach can find flaws of protocol implementation very easily. The method is of the important application value and can improve the security of network protocols.

  • Implementation of adaptive binary exponential backoff (ABEB) algorithm with dynamical sizing buffer for load-balanced RPL

    In RPL the pair wise metric may result in a single node with good transmission quality, linked to many neighboring nodes which are associated with a large number of children nodes. In this case, for one DODAG the parent node can be severely congested which results in a large number of packets drop due to buffer limitation on the parent node side. We propose an Adaptive Binary Exponential Backoff algorithm to handle multiple channel access issue in such a way that it avoids not only the collision at the sender side but also buffer overflow at receiver side without degrading channel utilization and throughput efficiency.

  • Various Buffer Overflow Detection Means for Elbrus Microprocessors

    A brief review of Protected Execution Mode (PEM) for user-space applications featured in Elbrus architecture is described first. Then, AddressSanitizer, a well-known utility by Google Inc, is considered as an example of a pure software technique of memory control. Comparative analysis of these solutions is given with performance flaws, applicability and boundary violation detection quality.

  • Research on buffer management mechanisms of IEEE 802.16m saving scheme

    The IEEE 802.16m network is the most popular network in Wireless Metropolitan Area Networks (WMANs). A user can send data from mobile devices to the Internet via IEEE 802.16m networks. An IEEE 802.16m network officially supports a power saving mechanism to make mobile devices work longer. In IEEE 802.16m networks, a base station caches data destined to a mobile device when the mobile device enters the sleep mode. When the mobile device wakes up, the base station sends the cached data to the mobile device in order to avoid data loss. Without a good buffer management mechanism, a base station may have buffer overflow to lose data if a mobile device sleeps a long time. In this paper, we propose a mechanism named Dynamic Buffer Management (DBM) to efficiently manage buffers of a base station in order to avoid the occurrence of buffer overflow. In simulations, DBM can reduce the occurrences of buffer overflow and data delay in IEEE 802.16m networks to efficiently utilize resources in networks.

  • Research on the Model of Vulnerability Mining Based on the Local Fuzz

    Fuzz used the concept of black-box testing, is critical to an auto vulnerability mining method, there is blindness in this method. This paper presents a semi-automation model of vulnerability mining based on local fuzz with data stream control and hidden debug technology, the practice shows us that this algorithm makes the fuzz much faster and correct.

  • Algebraic Patterns of Vulnerabilities in Binary Code

    This paper presents an algebraic approach for formalizing and detecting vulnerabilities in binary code. It uses behaviour algebra equations for creating patterns of vulnerabilities and algebraic matching methods for vulnerability detection. Algebraic matching is based on symbolic modelling. This paper considers a known vulnerability, buffer overflow, as an example to demonstrate an algebraic approach for pattern creation.

  • An efficient transport layer protocol with reduced packet losses and minimized retransmission time in wireless networks

    This research will design and develop a protocol that supports less packet drops and consumes a low retransmission time which is able to transmit data in a speedy and efficient manner within a wireless environment. This is vital in real time systems; specifically in way finding applications in order to gather critical information of patients, evade hazardous situations for disable persons, and receive alternative paths in navigation systems in instances of impediments. This research examines the existing Transport Layer Protocols (TLP's); mainly TCP since it has a high rate of data packet loss and high retransmission time when operating in wireless networks. This paper proposes two modified algorithms that solves high packet loss rate by avoiding buffer overflows and high retransmission time by applying a spaced hop methodology. The simulations are performed through the Network Simulator 2 software operating on the Linux platform (Ubuntu) and will graphically and statistically display the improvement achieved by the modifications.



Standards related to Buffer Overflows

Back to Top

No standards are currently tagged "Buffer Overflows"


Jobs related to Buffer Overflows

Back to Top