Author:
Apeko Jewel Donkor,Turner Claude
Publisher
Springer Nature Switzerland
Reference17 articles.
1. An, Z., Haiyan, L.: Locating the address of local variables to achieve a buffer overflow. In: 2013 International Conference on Computational and Information Sciences, pp. 1999–2002 IEEE (2013)
2. Black, P.E., Bojanova, I.: Defeating buffer overflow: a trivial but dangerous bug. IT Prof. 18(6), 58–61 (2016)
3. Erb, C., Collins, M., Greathouse, J.L.: Dynamic buffer overflow detection for GPGPUs. In: 2017 IEEE/ACM International Symposium on Code Generation and Optimization (CGO) (2017)
4. Chen, G., et al.: Safestack: automatically patching stack-based buffer overflow vulnerabilities. IEEE Trans. Depend. Secure Comput. 10(6), 368–379 (2013)
5. Du, W.: Buffer overflow attack. In: Du, W. (ed.) Computer and Internet Security: A Hands-On Approach, pp. 64–99. Indiana: Independent Publisher (2019)