共 50 条
- [1] Buffer overflows: Exploitation and detection IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 918 - +
- [4] Constraint-Based Testing for Buffer Overflows COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2018, 2018, 11094 : 99 - 111
- [6] A Taxonomy of Software Flaws Leading to Buffer Overflows 2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 1 - 8
- [7] Verification of C Buffer Overflows in C Programs 2018 17TH ROEDUNET IEEE INTERNATIONAL CONFERENCE: NETWORKING IN EDUCATION AND RESEARCH (ROEDUNET), 2018,
- [8] Using static symbolic execution to detect buffer overflows Programming and Computer Software, 2017, 43 : 277 - 288
- [9] Eliminating Cell Broadband Engine™ DMA Buffer Overflows IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (05): : 1062 - 1069
- [10] Exploiting buffer overflows over Bluetooth: the BluePAss tool 2005 International Conference on Wireless and Optical Communications Networks, 2005, : 66 - 70