Buffer Overflow Vulnerabilities in the Age of AI: Challenges and Mitigation Strategies
Article Sidebar
Main Article Content
Abstract: Buffer overflow vulnerabilities have plagued software systems for decades and continue to pose a significant security risk. My paper provides a comprehensive analysis of buffer overflows, detailing their mechanisms, historical context, and the challenges they present to modern systems. It explores traditional and contemporary defense strategies, including compile-time and run-time defenses, and examines the potential role of emerging technologies like Artificial Intelligence (AI) in mitigating these vulnerabilities. The paper emphasizes the ongoing need for robust security practices and continuous research to address this enduring threat.
Downloads
References
Black, Paul E., and Irena Bojanova. "Defeating buffer overflow: A trivial but dangerous bug." IT professional 18, no. 6 (2016): 58-61.
Maroš, B., Homoliak, I., Kacic, M. and Petr, H., 2013, October. Detection of network buffer overflow attacks: A case study. In 2013 47th International Carnahan Conference on Security Technology (ICCST) (pp. 1-4). IEEE.
Piromsopa, Krerk, and Richard J. Enbody. "Buffer-overflow protection: the theory." 2006 IEEE International Conference on Electro/Information Technology. IEEE, 2006.
Day, David Jonathan. Mitigating the Risk of Buffer Overflow Attacks Against Forked Daemon Servers Using Network Intrusion Detection Systems. University of Derby (United Kingdom), 2010.
Alam, Shahid. "Cybersecurity: Past, present and future." arXiv preprint arXiv:2207.01227 (2022).
Gu A, Jain N, Li WD, Shetty M, Shao Y, Li Z, Yang D, Ellis K, Sen K, Solar-Lezama Challenges and paths towards ai for software engineering. arXiv preprint arXiv:2503.22625. 2025 Mar 28.
Xu H, Wang S, Li N, Wang K, Zhao Y, Chen K, Yu T, Liu Y, Wang H. Large language models for cyber security: A systematic literature review. arXiv preprint arXiv:2405.04760. 2024 May 8.

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in our journal are licensed under CC-BY 4.0, which permits authors to retain copyright of their work. This license allows for unrestricted use, sharing, and reproduction of the articles, provided that proper credit is given to the original authors and the source.