Buffer Overflow Attack
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2012, Vol 1, Issue 1
Abstract
- Exploits, vulnerabilities, and buffer-overflow techniques have been used by malicious hackers and virus writers for a long time. In order to attack and get the remote root privilege, using buffer overflow and suidprogram has become the commonly used method for hackers. This paper include vast idea and information regarding the buffer overflow as history of Vulnerabilities, buffers, stack, registers, Buffer Overflow Vulnerabilities and Attacks, current buffer over flow, Shell code, Buffer Overflow Issues, the Source of the Problem, prevention/detection of Buffer Overflow attacks and Finally how to react towards Buffer Overflows. The objective of this study is to take one inside the buffer overflow attack and bridge the gap between the “descriptive account” and the “technically intensive account
Authors and Affiliations
Samanvay Gupta
An Automated Approach for Job Scheduling and Work Flow Mining
Abstract: Now a day’s work allotment in a software firm become more important and cumbersome. The main objective of this concept is to reduce the work of the software developers in a software company and work alloc...
Evolution of Cloud Storage as Cloud Computing Infrastructure Service
Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are...
A Novel Approach To Topological Skeletonization Of English Alphabets And Characters
In this paper we put forward a modified approach towards skeletonization of English alphabets and characters. This algorithm has been designed to find the skeleton of all the typeface of Modern English as present i...
Novel Approach For Isolated Left Endobronchial Intubation With Single Lumen Tube In Paediatric Patients
Background: Right thoracoscopy requires selective left endobronchial intubation which is technically difficult and demanding. We are presenting our experience of selective left bronchus intubation without any guidance,us...
Health Diagnosis Using Wban Technology
Abstract: Invention of the low power consuming wireless sensors are raising the emergence for the usage of wireless body area networks (WBAN).WBAN is widely used in many applications such as entertainment, gaming,...