Buffer overflows: attacks and defenses for the vulnerability of the decade

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Cowan, C., Wagle, P., Pu, C., Beattie, S., Walpole, J.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 237
container_issue
container_start_page 227
container_title
container_volume
creator Cowan, C.
Wagle, P.
Pu, C.
Beattie, S.
Walpole, J.
description
doi_str_mv 10.1109/FITS.2003.1264935
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1264935</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1264935</ieee_id><sourcerecordid>1264935</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-c305a7c89123284b3bfe1557f90b5fa4aa89c7f90167c5f881d18bd58d65be5c3</originalsourceid><addsrcrecordid>eNotj91KAzEUhAMiKHUfQLzJC-x6stmzSbzTYm2l4IV7X_JzgqtrV5JtpW9v1c7NMN_AwDB2LaASAsztYtW9VjWArETdNkbiGSuM0qBagzWgwgtW5PwOR0lz7OGSPT_sYqTExz2lOIzf-Y7babL-I3O7DTxQpG2mzOOY-PRGfL8btpSs64d-OvAx_sFA3ga6YufRDpmKk89Yt3js5sty_fK0mt-vy97AVHoJaJXXRtSy1o2TLpJAVNGAw2gba7Xxv0m0ymPUWgShXUAdWnSEXs7Yzf9sT0Sbr9R_2nTYnA7LH7E5S9I</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Buffer overflows: attacks and defenses for the vulnerability of the decade</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Cowan, C. ; Wagle, P. ; Pu, C. ; Beattie, S. ; Walpole, J.</creator><creatorcontrib>Cowan, C. ; Wagle, P. ; Pu, C. ; Beattie, S. ; Walpole, J.</creatorcontrib><identifier>ISBN: 9780769520575</identifier><identifier>ISBN: 076952057X</identifier><identifier>DOI: 10.1109/FITS.2003.1264935</identifier><language>eng</language><publisher>IEEE</publisher><subject>Buffer overflow ; Buffer storage ; Computer science ; Contracts ; Information security ; Libraries ; Logic ; Payloads ; Registers</subject><ispartof>Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], 2003, p.227-237</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1264935$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,4036,4037,27906,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1264935$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Cowan, C.</creatorcontrib><creatorcontrib>Wagle, P.</creatorcontrib><creatorcontrib>Pu, C.</creatorcontrib><creatorcontrib>Beattie, S.</creatorcontrib><creatorcontrib>Walpole, J.</creatorcontrib><title>Buffer overflows: attacks and defenses for the vulnerability of the decade</title><title>Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]</title><addtitle>FITS</addtitle><subject>Buffer overflow</subject><subject>Buffer storage</subject><subject>Computer science</subject><subject>Contracts</subject><subject>Information security</subject><subject>Libraries</subject><subject>Logic</subject><subject>Payloads</subject><subject>Registers</subject><isbn>9780769520575</isbn><isbn>076952057X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj91KAzEUhAMiKHUfQLzJC-x6stmzSbzTYm2l4IV7X_JzgqtrV5JtpW9v1c7NMN_AwDB2LaASAsztYtW9VjWArETdNkbiGSuM0qBagzWgwgtW5PwOR0lz7OGSPT_sYqTExz2lOIzf-Y7babL-I3O7DTxQpG2mzOOY-PRGfL8btpSs64d-OvAx_sFA3ga6YufRDpmKk89Yt3js5sty_fK0mt-vy97AVHoJaJXXRtSy1o2TLpJAVNGAw2gba7Xxv0m0ymPUWgShXUAdWnSEXs7Yzf9sT0Sbr9R_2nTYnA7LH7E5S9I</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Cowan, C.</creator><creator>Wagle, P.</creator><creator>Pu, C.</creator><creator>Beattie, S.</creator><creator>Walpole, J.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2003</creationdate><title>Buffer overflows: attacks and defenses for the vulnerability of the decade</title><author>Cowan, C. ; Wagle, P. ; Pu, C. ; Beattie, S. ; Walpole, J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-c305a7c89123284b3bfe1557f90b5fa4aa89c7f90167c5f881d18bd58d65be5c3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Buffer overflow</topic><topic>Buffer storage</topic><topic>Computer science</topic><topic>Contracts</topic><topic>Information security</topic><topic>Libraries</topic><topic>Logic</topic><topic>Payloads</topic><topic>Registers</topic><toplevel>online_resources</toplevel><creatorcontrib>Cowan, C.</creatorcontrib><creatorcontrib>Wagle, P.</creatorcontrib><creatorcontrib>Pu, C.</creatorcontrib><creatorcontrib>Beattie, S.</creatorcontrib><creatorcontrib>Walpole, J.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Cowan, C.</au><au>Wagle, P.</au><au>Pu, C.</au><au>Beattie, S.</au><au>Walpole, J.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Buffer overflows: attacks and defenses for the vulnerability of the decade</atitle><btitle>Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]</btitle><stitle>FITS</stitle><date>2003</date><risdate>2003</risdate><spage>227</spage><epage>237</epage><pages>227-237</pages><isbn>9780769520575</isbn><isbn>076952057X</isbn><pub>IEEE</pub><doi>10.1109/FITS.2003.1264935</doi><tpages>11</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9780769520575
ispartof Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems], 2003, p.227-237
issn
language eng
recordid cdi_ieee_primary_1264935
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Buffer overflow
Buffer storage
Computer science
Contracts
Information security
Libraries
Logic
Payloads
Registers
title Buffer overflows: attacks and defenses for the vulnerability of the decade
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T20%3A56%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Buffer%20overflows:%20attacks%20and%20defenses%20for%20the%20vulnerability%20of%20the%20decade&rft.btitle=Foundations%20of%20Intrusion%20Tolerant%20Systems,%202003%20%5BOrganically%20Assured%20and%20Survivable%20Information%20Systems%5D&rft.au=Cowan,%20C.&rft.date=2003&rft.spage=227&rft.epage=237&rft.pages=227-237&rft.isbn=9780769520575&rft.isbn_list=076952057X&rft_id=info:doi/10.1109/FITS.2003.1264935&rft_dat=%3Cieee_6IE%3E1264935%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1264935&rfr_iscdi=true