Use of Ensemble Learning to Detect Buffer Overflow Exploitation
Software exploitation detection remains unresolved problem. Software exploits that target known and unknown vulnerabilities are constantly used in attacks. Signature-based detection techniques are limited to known exploits and susceptible to circumvention. Current research on the use of Machine Lear...
Main Authors: | Ayman Youssef, Mohamed Abdelrazek, Chandan Karmakar |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2023-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10131927/ |
Similar Items
-
Buffer Overflow Exploits
by: Khurram Farooq, et al.
Published: (2003-12-01) -
Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits
by: Christopher Kugler, et al.
Published: (2015-10-01) -
A Security Design for the Detecting of Buffer Overflow Attacks in IoT Device
by: Bin Xu, et al.
Published: (2018-01-01) -
Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
by: Yufeng Li, et al.
Published: (2023-05-01) -
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
by: Lili Xu, et al.
Published: (2020-09-01)