Skip to Main Content
With new applications being launched each day, the number of vulnerabilities to attack increases. Attackers find new ways to attack any application they come across. Some attacks are successful because the application is vulnerable due to the vulnerabilities in files assisting in the proper functioning of the application. Although the area of attacks is vast, buffer overflow attacks form the basis for most attacks. Hence it would be a great boon to the software industry if their products were made secure from buffer overflow attacks. This paper introduces a tool, which is used to locate vulnerable files, which in turn have been the root cause for buffer overflow.