2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST) 2018
DOI: 10.1109/asianhost.2018.8607169
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Hardware-Oriented Runtime Approach for Stack-based Software Buffer Overflow Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…A work on adaptive pipeline [34] allows a transparent solution to programmers/compilers and has very low overhead. However, it mainly focuses on stackbased buffer-overflow attacks during runtime.…”
Section: Recent Architectural Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…A work on adaptive pipeline [34] allows a transparent solution to programmers/compilers and has very low overhead. However, it mainly focuses on stackbased buffer-overflow attacks during runtime.…”
Section: Recent Architectural Approachesmentioning
confidence: 99%
“…For example, Segmentation [25], Type-Assisted Buffer Overflow Detection [19], C Range Error Detector (CRED) [32], Integer Analysis to Determine Buffer Overflow [39], STOBO [14] and MemGuard [7] can detect stack/heap overflows on both control and non-control data, but some cannot detect array indexing errors. Jump Pointer [36] and adaptive pipeline [34] focus on stack overflows. StackGuard [7], SmashGuard [7], Minezone RAD [37] and Read-only RAD [37] can detect stack overflows, but focus on control data only.…”
Section: 1 Comparison Of Protection Coveragementioning
confidence: 99%
“…Still today many companies and individuals lack the awareness of the threats out there. This means that attacks such as Cross Site Scripting [30], SQL Injection [20], [8], [36], Denial of Service (DOS) [53], [51], Buffer Overflow [43] and Password Cracking [1], [54] are still relevant and viable attacks in the today's world.…”
Section: Introductionmentioning
confidence: 99%