Add new references
This commit is contained in:
parent
ba9b29e855
commit
2bbab747ac
@ -7,6 +7,20 @@ own:
|
|||||||
year = {2002}
|
year = {2002}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@inproceedings{Detection2018,
|
||||||
|
author = {Chaim, Marcos and Santos, Daniel and Cruzes, Daniela},
|
||||||
|
booktitle = {International Journal of Systems and Software Security and Protection},
|
||||||
|
title = {What Do We Know About Buffer Overflow Detection?: A Survey on Techniques to Detect A Persistent Vulnerability},
|
||||||
|
year = {2018}
|
||||||
|
}
|
||||||
|
|
||||||
|
@inproceedings{AtkDef2016,
|
||||||
|
author = {Wang, Wei},
|
||||||
|
booktitle = {7\textsuperscript{th} International Conference on Education, Management, Information and Computer Science (ICEMC 2017)},
|
||||||
|
title = {Survey of Attacks and Defenses on Stack-based Buffer Overflow Vulnerability},
|
||||||
|
year = {2017}
|
||||||
|
}
|
||||||
|
|
||||||
@INPROCEEDINGS{Effectiveness2014,
|
@INPROCEEDINGS{Effectiveness2014,
|
||||||
author={H. M. {Gisbert} and I. {Ripoll}},
|
author={H. M. {Gisbert} and I. {Ripoll}},
|
||||||
booktitle={IEEE 13\textsuperscript{th} International Symposium on Network Computing and Applications},
|
booktitle={IEEE 13\textsuperscript{th} International Symposium on Network Computing and Applications},
|
||||||
@ -31,6 +45,25 @@ year = {2001}
|
|||||||
year = {1998}
|
year = {1998}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ARTICLE{Smashing2004,
|
||||||
|
author={J. {Pincus} and B. {Baker}},
|
||||||
|
journal={IEEE Security Privacy},
|
||||||
|
title={Beyond stack smashing: recent advances in exploiting buffer overruns},
|
||||||
|
year={2004},
|
||||||
|
volume={2},
|
||||||
|
number={4},
|
||||||
|
}
|
||||||
|
|
||||||
|
@article{Counter2012,
|
||||||
|
author = {Younan, Yves and Joosen, Wouter and Piessens, Frank},
|
||||||
|
title = {{Runtime countermeasures for code injection attacks against C and C++ programs}},
|
||||||
|
year={2012},
|
||||||
|
journal = {ACM Computing Surveys (CSUR)},
|
||||||
|
volume = {44},
|
||||||
|
number = {3},
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
@InProceedings{Dep2007,
|
@InProceedings{Dep2007,
|
||||||
author={Condit, Jeremy
|
author={Condit, Jeremy
|
||||||
and Harren, Matthew
|
and Harren, Matthew
|
||||||
@ -42,6 +75,14 @@ booktitle={Programming Languages and Systems},
|
|||||||
year={2007}
|
year={2007}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ONLINE{Cve2018,
|
||||||
|
author={MITRE},
|
||||||
|
title={{Security Vulnerabilities Published In 2018(Overflow)}},
|
||||||
|
urlDate = {2019-11-10},
|
||||||
|
year = {2018},
|
||||||
|
url={https://www.cvedetails.com/vulnerability-list/year-2018/opov-1/overflow.html}
|
||||||
|
}
|
||||||
|
|
||||||
existing:
|
existing:
|
||||||
|
|
||||||
@article{Laprie2004,
|
@article{Laprie2004,
|
||||||
|
Loading…
Reference in New Issue
Block a user