1 |
Chiamwongpaet, Sirisara, and Krerk Piromsopa. "Boundary Bit: Architectural Bound Checking for Buffer-Overflow Protection." ECTI Transactions on Computer and Information Technology (ECTI-CIT) 14.2 (2020): 162-173. Fan, X., Cao, J.: A Survey of Mobile Cloud Computing. ZTE Communications 9(1), 4-8 (2011)
DOI
|
2 |
Mihailescu, Marius Iulian, and Stefania Loredana Nita. "Brute Force and Buffer Overflow Attacks." Pro Cryptography and Cryptanalysis with C++ 20. Apress, Berkeley, CA, 2021. 423-434.
|
3 |
Seedsecuritylabs.org. 2021. Buffer-Overflow Vulnerability Lab. [online] Available at: [Accessed 12 November 2021].
|
4 |
Wang, Zhilong, et al. "To detect stack buffer overflow with polymorphic canaries." 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2018.
|
5 |
Sah, Love Kumar, Sheikh Ariful Islam, and Srinivas Katkoori. "An efficient hardware-oriented runtime approach for stack-based software buffer overflow attacks." 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 2018.
|
6 |
Nicula, stefan, and Razvan Daniel Zota. "Exploiting stack-based buffer overflow using modern day techniques." Procedia Computer Science 160 (2019): 9-14.
DOI
|
7 |
Di, Bang, et al. "Efficient Buffer Overflow Detection on GPU." IEEE Transactions on Parallel and Distributed Systems 32.5 (2020): 1161-1177.
|