Buffer Overflow Exploits
DOI:
https://doi.org/10.31384/jisrmsse/2003.01.2.3Keywords:
Buffer Overflow, prevent attackers, hackers, security vulnerabilitiesAbstract
The focus of this Study is on providing an understanding of buffer overflows, the ways they are exploited, and ways to prevent attackers from abusing them. Although this problem has been around for decades, the devastating effects have been downplayed by the commercial organizations due to the fact that they require a lot of effort to trace and to fix. This has led to a flood of software on the market which claims to be secure, yet can be exploited by wily hackers. As our reliance on closed-source and proprietary systems increases, we have to face the facts that there could be a myriad of security vulnerabilities in the very tools we use to protect critical data. To be informed is to be better armed.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2003 Author
This work is licensed under a Creative Commons Attribution 4.0 International License.
Copyright: The Authors