Exploit Development Research on x86 Windows Application: Buffer Overflow

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it

Authors and Affiliations

Keywords

Related Articles

Making of Advanced Ontology Based Search and Standardization Engine using Type Convertor Algorithm

Semantic web service (SWS) is an extension of the web service with an explicit representation of meanings. It promises to increase the level of automation and has ability to integrate and reuse diverse information resour...

Micronutrients Dietary Intakes of Pregnant Sudanese Women

"Nutritional imbalance could cause detrimental effects to the pregnant woman by influencing pregnancy outcome and impair breast milk composition. Fetal growth and development are strongly linked with maternal supply of...

Orbital Echinococcosis: A Case Report

"Echinococcosis is a zoonotic disease caused by the larval stage of the metacestode stage. Orbital echinococcosis predominantly caused by E.granulosus manifests as a unilocular cyst. Orbital involvement comprises 0.3% t...

Fingerprint Compression Technique using Sparse Representation

Fingerprint is the most famous biometric that is mostly used in various authentication systems. Fingerprint of human being exhibit certain details marked on it, categorized it as minutiae, which can be used as a unique i...

Bullous Pemphigoid: IGA Autoantibodies Target Epitopes on of Bullous Pemphigoid Antigen 180 Using Recombinant Ectodomains of Collagen XVII

Type XVII collagen (BP180), promotes adhesion of basal keratinocytes to epidermal basement membrane, and is the target of disease in patients with certain inherited or acquired blistering diseases. Therefore, the aim of...

Download PDF file
  • EP ID EP356985
  • DOI -
  • Views 60
  • Downloads 0

How To Cite

(2015). Exploit Development Research on x86 Windows Application: Buffer Overflow. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-356985