Exploit Development Research on x86 Windows Application: Buffer Overflow

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it

Authors and Affiliations

Keywords

Related Articles

Campylobacter – A Foodborne Pathogen

Campylobacter is well recognized as the leading cause of bacterial food borne diarrheal disease worldwide. Symptoms can range from mild to serious infections of the children and the elderly. The organism is a cytochrome...

JPEG Picture Compression Using Discrete Cosine Transform

For the past few years, a joint ISO/CCITT committee known as JPEG (Joint Photographic Experts Group) has been working to establish the first international compression standard for continuous tone still images, both grays...

Information Packaging for Communication with the Physically Challenged

The fact that the physically challenged are human beings means that; they have different needs. One of them is the need for information and also the need to be communicated with. More importantly, these people with disab...

Nigeria Industrial and University Education Entrepreneurial Experience

Nigeria Industrial and University Education Entrepreneurial Experience

Attenuation of NFkB Activation Augments Alveolar Transport Proteins Expression and Activity under Hypoxia

Epithelial sodium channels (ENaCs) controls vectorial Na+ across epithelia thus playing a central role in all aspects of fluid clearance in the body. The aim of this study was to investigate in vitro time dependant mod...

Download PDF file
  • EP ID EP356985
  • DOI -
  • Views 51
  • Downloads 0

How To Cite

(2015). Exploit Development Research on x86 Windows Application: Buffer Overflow. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-356985