Buffer Overflow Exploits

Authors

  • Khurram Farooq SZABIST-Karachi
  • Ayaz Ugaili SZABIST-Karachi

DOI:

https://doi.org/10.31384/jisrmsse/2003.01.2.3

Keywords:

Buffer Overflow, prevent attackers, hackers, security vulnerabilities

Abstract

The focus of this Study is on providing an understanding of buffer overflows, the ways they are exploited, and ways to prevent attackers from abusing them. Although this problem has been around for decades, the devastating effects have been downplayed by the commercial organizations due to the fact that they require a lot of effort to trace and to fix. This has led to a flood of software on the market which claims to be secure, yet can be exploited by wily hackers. As our reliance on closed-source and proprietary systems increases, we have to face the facts that there could be a myriad of security vulnerabilities in the very tools we use to protect critical data. To be informed is to be better armed.

Downloads

Download data is not yet available.

Downloads

Published

2003-12-31

How to Cite

Farooq, K., & Ugaili, A. (2003). Buffer Overflow Exploits. JISR Management and Social Sciences & Economics, 1(2), 14–17. https://doi.org/10.31384/jisrmsse/2003.01.2.3

Issue

Section

Original Articles