Cart (Loading....) | Create Account
Close category search window
 

Vulnerability scanning for buffer overflow

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Aishwarya Iyer ; Dept. of Comput. Sci., New Mexico Tech., USA ; Liebrock, L.M.

With new applications being launched each day, the number of vulnerabilities to attack increases. Attackers find new ways to attack any application they come across. Some attacks are successful because the application is vulnerable due to the vulnerabilities in files assisting in the proper functioning of the application. Although the area of attacks is vast, buffer overflow attacks form the basis for most attacks. Hence it would be a great boon to the software industry if their products were made secure from buffer overflow attacks. This paper introduces a tool, which is used to locate vulnerable files, which in turn have been the root cause for buffer overflow.

Published in:

Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on  (Volume:2 )

Date of Conference:

5-7 April 2004

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.