2021
DOI: 10.1109/access.2021.3120349
|View full text |Cite
|
Sign up to set email alerts
|

Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 30 publications
2
2
0
Order By: Relevance
“… Undergo training in writing secure code: The findings have indicated a lack of knowledge and practices to find vulnerabilities. This finding has also been confirmed by a recent study [8] that showed that most buffer overflow vulnerabilities are associated with missing checks (e.g., missing if construct around a statement) or incorrect checking (e.g., the wrong logical expression used as a branch condition). Regardless of the PLs used in coding, developers should have the required knowledge, training, and practices of secure source code.…”
Section: Timely Recommendationssupporting
confidence: 69%
See 3 more Smart Citations
“… Undergo training in writing secure code: The findings have indicated a lack of knowledge and practices to find vulnerabilities. This finding has also been confirmed by a recent study [8] that showed that most buffer overflow vulnerabilities are associated with missing checks (e.g., missing if construct around a statement) or incorrect checking (e.g., the wrong logical expression used as a branch condition). Regardless of the PLs used in coding, developers should have the required knowledge, training, and practices of secure source code.…”
Section: Timely Recommendationssupporting
confidence: 69%
“…However, the safer functions are not completely safe because strncpy() was a cause for buffer overflow in CP1 in Table V. This finding has been confirmed by previous researchers [8]. In particular, the unsafe strcpy() takes two arguments-destination and source-and the function copies the source, including the NULL character, to the destination.…”
Section: B Buffer Overflow/xsssupporting
confidence: 66%
See 2 more Smart Citations