Communication-Traffic-Assisted Mining and Exploitation of Buffer Overflow Vulnerabilities in ADASs
Advanced Driver Assistance Systems (ADASs) are crucial components of intelligent vehicles, equipped with a vast code base. To enhance the security of ADASs, it is essential to mine their vulnerabilities and corresponding exploitation methods. However, mining buffer overflow (BOF) vulnerabilities in...
Main Authors: | Yufeng Li, Mengxiao Liu, Chenhong Cao, Jiangtao Li |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-05-01
|
Series: | Future Internet |
Subjects: | |
Online Access: | https://www.mdpi.com/1999-5903/15/5/185 |
Similar Items
-
Buffer Overflow Exploits
by: Khurram Farooq, et al.
Published: (2003-12-01) -
ELAID: detecting integer-Overflow-to-Buffer-Overflow vulnerabilities by light-weight and accurate static analysis
by: Lili Xu, et al.
Published: (2020-09-01) -
Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits
by: Christopher Kugler, et al.
Published: (2015-10-01) -
Use of Ensemble Learning to Detect Buffer Overflow Exploitation
by: Ayman Youssef, et al.
Published: (2023-01-01) -
Characterizing Buffer Overflow Vulnerabilities in Large C/C++ Projects
by: Jose D'Abruzzo Pereira, et al.
Published: (2021-01-01)