Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00
DOI: 10.1109/discex.2000.821514
|View full text |Cite
|
Sign up to set email alerts
|

Buffer overflows: attacks and defenses for the vulnerability of the decade

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
57
0

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 186 publications
(93 citation statements)
references
References 5 publications
0
57
0
Order By: Relevance
“…The body of work in communication security [18], host based security [19], and software security [20] can often be directly applied to UAVs. However, UAVs pose specific problems that cannot be addressed by simply applying known solutions [6,11,14].…”
Section: Related Workmentioning
confidence: 99%
“…The body of work in communication security [18], host based security [19], and software security [20] can often be directly applied to UAVs. However, UAVs pose specific problems that cannot be addressed by simply applying known solutions [6,11,14].…”
Section: Related Workmentioning
confidence: 99%
“…Without knowing the encryption key, an attacker cannot obtain control of a victim system even if the attacker can overwrite contents of the activation record. StackGuard is a dynamic buffer overflow attack detection mechanism [6,7]. StackGuard implements a canary word as a detection sensor on top of the return address in the activation record.…”
Section: Related Workmentioning
confidence: 99%
“…The enhanced function tear down code first checks to see that the canary word is intact before jumping to the address pointed to by the return address word. Critical to the StackGuard "canary" approach is that the attacker is prevented from forging a canary by embedding the canary word in the overflow string [5].…”
Section: Blast: Blast (Berkeley Lazy Abstractionmentioning
confidence: 99%