Buffer Overflow Attack

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 1, Issue 1

Abstract

 - Exploits, vulnerabilities, and buffer-overflow techniques have been used by malicious hackers and virus writers for a long time. In order to attack and get the remote root privilege, using buffer overflow and suidprogram has become the commonly used method for hackers. This paper include vast idea and information regarding the buffer overflow as history of Vulnerabilities, buffers, stack, registers, Buffer Overflow Vulnerabilities and Attacks, current buffer over flow, Shell code, Buffer Overflow Issues, the Source of the Problem, prevention/detection of Buffer Overflow attacks and Finally how to react towards Buffer Overflows. The objective of this study is to take one inside the buffer overflow attack and bridge the  gap between the “descriptive account” and the “technically intensive account

Authors and Affiliations

Samanvay Gupta

Keywords

Related Articles

Prediction of Epileptic Seizure: A Review

Abstract: Epilepsy is a neurological disorder affecting about 50 million people worldwide. Many techniques have been developed for predicting the basic features of epileptic seizures. Techniques used to forecast seizures...

 An Exploration of HCI Design Features and Usability Techniques  in Gaming

 This Conference paper explores the human computer interaction design features relating to gaming industry. The HCI user design interface development and HCI Usability expectations are discussed in this paper. H...

 Password-oriented Image Encryption with multiple dependent factors.

 Abstract: The goal of this project was to develop a password-based image encryption algorithm that would be virtually safe from brute-force attacks, resulting in an image that would have no recognizable pattern. Th...

 Implementation of AES Algorithm in MicroController Using  PIC18F452

 Security has become an increasingly important feature with the growth of electronic communication which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the  encr...

Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography

Abstract: This study combines classic and modern cryptographic algorithms so that the data security of information more awake authenticity. Caesar cipher is the oldest classical cryptography which uses a symmetric key me...

Download PDF file
  • EP ID EP87482
  • DOI -
  • Views 125
  • Downloads 0

How To Cite

Samanvay Gupta (2012).  Buffer Overflow Attack. IOSR Journals (IOSR Journal of Computer Engineering), 1(1), 10-23. https://europub.co.uk/articles/-A-87482