2009 IEEE International Conference on Electro/Information Technology 2009
DOI: 10.1109/eit.2009.5189584
|View full text |Cite
|
Sign up to set email alerts
|

The implementation of Secure Canary Word for buffer-overflow protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…We only evaluated the effect on the performance because the architectural-level simulation has been validated in previous work [4]. There is no need for low-level simulation here.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…We only evaluated the effect on the performance because the architectural-level simulation has been validated in previous work [4]. There is no need for low-level simulation here.…”
Section: Discussionmentioning
confidence: 99%
“…A buffer-overflow attack can be described as an attack in which a buffer is overflowed beyond its bounds into another buffer with an intent to cause malicious behavior in a program [4,29,40].…”
Section: Background: Buffer-overflow Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…5. Buffer-overflow Attacks [6] means an attack caused by overflowing a buffer or writing beyond data boundary with data from another domain which results in malicious or unexpected behaviors of a program. Buffer-overflow attacks can be classified into 3 types: 1) Stack Overflows 2) Heap Overflows 3) Array Indexing Errors.…”
Section: I2 Glossarymentioning
confidence: 99%