Author:
Eddine Jamai Badr,Abdellaoui Abderrahim,Anass Bouchnafa
Publisher
Springer Nature Switzerland
Reference15 articles.
1. Butt, M.A., Ajmal, Z., Khan, Z.I., Idrees, M., Javed, Y.: An in-depth survey of bypassing buffer overflow mitigation techniques. Appl. Sci., 6702 (2022)
2. Gadient, A., Ortiz, B., Barrato, R., Davis, E., Perkins, J., Rinard, M.: Automatic exploitation of fully randomized executables (2019)
3. Xu, L., Jia, W., Dong, W., Li, Y.: Automatic exploit generation for buffer overflow vulnerabilities. In: 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), pp. 463–468 (2018)
4. Xu, S., Wang, Y.: BofAEG: automated stack buffer overflow vulnerability detection and exploit generation based on symbolic execution and dynamic analysis. Secur. Commun. Netw. (2022)
5. Nicula, Zota, R.D.: Exploiting stack-based buffer overflow using modern day techniques. Procedia Comput. Sci., 9–14 (2019)