共 50 条
- [31] PointGuard™:: Protecting pointers from buffer overflow vulnerabilities USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, 2003, : 91 - 104
- [32] Exploiting Buffer Overflow Vulnerabilities in Software Defined Radios IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1921 - 1927
- [33] DoSGuard: Protecting Pipelined MPSoCs Against Hardware Trojan Based DoS Attacks 2017 IEEE 28TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS (ASAP), 2017, : 45 - 52
- [34] Survey of Protections from Buffer-Overflow Attacks ENGINEERING JOURNAL-THAILAND, 2011, 15 (02): : 31 - 52
- [35] Buffer overflow attacks on linux principles analyzing and protection DCABES 2002, PROCEEDING, 2002, : 385 - 387
- [36] Detection of Network Buffer Overflow Attacks: A Case Study 2013 47TH INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2013,
- [37] On evolving buffer overflow attacks using genetic programming GECCO 2006: GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, VOL 1 AND 2, 2006, : 1667 - +
- [38] A dynamic mechanism for recovering from buffer overflow attacks INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 1 - 15
- [39] Characteristics of Buffer Overflow Attacks Tunneled in HTTP Traffic 2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
- [40] Assuring Software Security Against Buffer Overflow Attacks in Embedded Software Development Life Cycle 12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 787 - 790