Analysis of Buffer Overflow Exploits and Prevention Strategies

Article Preview

Abstract:

With the rapid development of network technology and the emergence of a variety of applications,network security issues became the top priority of the network applications. This article first explains the concept of buffer overflow,and then from the programming language itself flawed,not robust perspective on the emergence,to the emergence of buffer overflow attacks and principle are analyzed in detail,described hackers using buffer overflow attacks the general process,and according to the type of buffer overflow attacks,software development and program runs from two aspects of proposed buffer overflow attack prevention strategy.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1701-1704

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Jiang Weihua, Li Weihua, DU Jun: buffer overflow attack prevention and detection principle [J]. Computer Engineering, 2003, 10: 5-7.

Google Scholar

[2] Dildog: The Tao of Windows Buffer Overflows, Phrack Magazine, 12(55), (1999).

Google Scholar

[3] Peter Silberman and Richard Johnson: A Comparison of Buffer Overflow Prevention Implementations and Weaknesses, 2005. 9.

Google Scholar

[4] Joanna Rutkowska: Defining the Roadmap for Malware Detection on Windows System, 2005. 6.

Google Scholar

[5] Jingmin Zhou: How ManyWays to Defeat Buffer Overflow, 2004. 1.

Google Scholar

[6] Jun Xu, Zbigniew Kalbarczyk, Sanjay Patel and Ravishankar K. Iyer: Architecture Support for Defending Against Buffer Overflow Attacks, 2003. 2.

Google Scholar