Buffer Overflows Attacks and Defenses for the Vulnerability of the Decade

Posted in Internet Security Whitepapers, Buffer Overflows, Exploit Writing Techniques

0.0/5 rating (0 votes)

Buffer overflows have been the most common form of security vulnerability for the last ten years. More over, buffer overflow vulnerabilities dominate the area of remote network penetration vulnerabilities, where an anonymous Internet user seeks to gain partial or total control of a host. If buffer overflow vulnerabilities could be effectively eliminated, a very large portion of the most serious security threats would also be eliminated. In this paper, we survey the various types of buffer overflow vulnerabilities and attacks, and survey the various defensive measures that mitigate buffer overflow vulnerabilities, including our own StackGuard method. We then consider which combinations of techniques can eliminate the problem of buffer overflow vulnerabilities, while preserving the functionality and performance of existing systems.
∙:∙ If you have trouble viewing this document, please click the link below!
Buffer Overflows Attacks and Defenses for the Vulnerability of the Decade

Comments (0)

Leave a comment

Please login to leave a comment. Optional login below.