2011
DOI: 10.4186/ej.2011.15.2.31
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Protections from Buffer-Overflow Attacks

Abstract: Abstract. Buffer-overflow attacks began two decades ago and persist today. Over that time, a number of researchers have proposed many solutions. Their targets were either to prevent or to protect against buffer-overflow attacks. As defenses improved, attacks adapted and became more complicated. Given the maturity of field and the fact that some solutions now exist that can prevent most buffer-overflow attacks, it is time to examine these schemes and their critical issues. In this survey, approaches were catego… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…Ref. [18] introduced another architectural approach called Secure Bit, to protect control data such as return address. If secure bit is set for a particular data, it will not be used as control data and mark as untrustworthy [19].…”
Section: Hardware-based Mitigation Techniquesmentioning
confidence: 99%
“…Ref. [18] introduced another architectural approach called Secure Bit, to protect control data such as return address. If secure bit is set for a particular data, it will not be used as control data and mark as untrustworthy [19].…”
Section: Hardware-based Mitigation Techniquesmentioning
confidence: 99%
“…A taxonomy of buffer-overflow protection schemes was established by Piromsopa [28,31]. There are three broad categories: static analysis, dynamic solutions, and isolation.…”
Section: Related Work : Protections Against Buffer-overflow At-tacksmentioning
confidence: 99%
“…Figure 1 Buffer-Overflow Protections [9] From the above figure, these solutions are classified into 3 categories [9] as follows.…”
Section: Chapter III Literature Reviewsmentioning
confidence: 99%