Essays about: "Buffer overflow"

Showing result 1 - 5 of 11 essays containing the words Buffer overflow.

  1. 1. Amplifying heap overflow vulnerability detection with reinforcement learning

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Erik Thomasson; Ludwig Wideskär; [2023]
    Keywords : ;

    Abstract : The extensive development of cyberspace and the increasing potential for cybersecu-rity vulnerabilities demand the constant production of improved methods for detect-ing and mitigating vulnerabilities in software. In a perfect world, there would be atool that detects and mitigates all types of vulnerabilities in all types of software, butunfortunately, that is not the reality. READ MORE

  2. 2. Nuking Duke Nukem : Reaching the Stack via a Glboal Buffer Overflow in DOS Protected Mode

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Henrik Lindblom; [2023]
    Keywords : Computer Security; Operating Systems; Control-flow hijack attacks; Buffer Overflow; Stack; DOS;

    Abstract : Control-flow hijack attacks on software exploit vulnerabilities in the software’s memory handling. Over the years, various security mitigations have been developed to counter these attacks. However, compatibility issues have hindered the adoption of such measures in some legacy systems. READ MORE

  3. 3. Avoiding Congestion in a Data-Centric Opportunistic Network

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Sam Tavakoli; [2022]
    Keywords : ;

    Abstract : In opportunistic networking, data delivery is achieved by replicating data when transmitted to nodes within communication reach. The process repeats on a hop by hop basis, forwarding the data closer to other communities that have an interest in the given data. READ MORE

  4. 4. HypervisorLang : Attack Simulations of the OpenStack Nova Compute Node

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Freddy Aasberg; [2021]
    Keywords : ;

    Abstract : Cloud services are growing in popularity and the global public cloud services are forecasted to increase by 17% in 2020[1]. The popularity of cloud services is due to the improved resource allocation for providers and simplicity of use for the customer. READ MORE

  5. 5. Vulnerability assessment of source codeanalysis tools for memory corruptionvulnerabilities a comparative study

    University essay from

    Author : Johan Tejning; [2021]
    Keywords : ;

    Abstract : Background. One of the main reasons for memory corruption vulnerabilities lies in the lack of built in safety measures for the C/C++ programming language which is often time used to develop performance critical software. READ MORE