Exploit Development Research on x86 Windows Application: Buffer Overflow

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it

Authors and Affiliations

Keywords

Related Articles

Early Childhood Education in Pakistan: Issues and Challenges

This study aimed at exploring different issues and challenges of Early Childhood Education in Pakistan. The objectives of the study were to analyze the existing status, facilities and practices at ECE level in public and...

Fisher

There has been controversy over the submission on the fisher hypothesis; that there must be a one-to-one relationship between interest rate and inflation. Perhaps, several methods have been used to establish the theoreti...

Evaluation of Obstetric Ultrasound Biological Hazard

"Ultrasound examination for pregnant women is related to some physical parameters which depends on the ultrasound examination device as well as on some physical properties of the examined women. The relation between thes...

Display Technologies and their Applications in E Books

Since the back four decades the researchers of liquid crystal displays have focused primarily on matching the image quality of cathode-ray tubes used in television sets and computer monitors. That goal has been met. Now...

Family based Factors Leading to Street Children Phenomenon in Kenya

Family based Factors Leading to Street Children Phenomenon in Kenya

Download PDF file
  • EP ID EP356985
  • DOI -
  • Views 64
  • Downloads 0

How To Cite

(2015). Exploit Development Research on x86 Windows Application: Buffer Overflow. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-356985