2022
DOI: 10.1007/978-3-031-09827-7_6
|View full text |Cite
|
Sign up to set email alerts
|

A Unit-Based Symbolic Execution Method for Detecting Heap Overflow Vulnerability in Executable Codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…This code is given the name (Shellcode) which means that the offender can spawn a local shell such as (CMD or Bash) on the target machine. Second, the attackers exploit a weakness, such as buffer-overflow [5] or heap overflow [6], in the application code which allows them to run that Shellcode. Microsoft has adopted several techniques, to mitigate memory corruption attacks, such as an approach (DEP) [7], Address Space Layout Randomization (ASLR) [8].…”
Section: Introductionmentioning
confidence: 99%
“…This code is given the name (Shellcode) which means that the offender can spawn a local shell such as (CMD or Bash) on the target machine. Second, the attackers exploit a weakness, such as buffer-overflow [5] or heap overflow [6], in the application code which allows them to run that Shellcode. Microsoft has adopted several techniques, to mitigate memory corruption attacks, such as an approach (DEP) [7], Address Space Layout Randomization (ASLR) [8].…”
Section: Introductionmentioning
confidence: 99%