Abstract:
In recent decades, the buffer overflow has been a source of many serious security issues. In recent years, by the CERT/CC (Computer Emergency Response Term/Coordination C...Show MoreMetadata
Abstract:
In recent decades, the buffer overflow has been a source of many serious security issues. In recent years, by the CERT/CC (Computer Emergency Response Term/Coordination Center) issued advice on the buffer overflow vulnerability for more than accounted for 56.76%. Attack based on the buffer overflow loophole has brought serious harm to computer network. How to effectively eliminate attack based on the buffer overflow loophole has become a question, which everybody pays attention to. This paper first explains the concept of buffer overflow, buffer overflow principle; and then the jump instruction is given using the examples of realization of buffer overflow attacks; and finally, combined with the type of buffer overflow attacks, buffer overflow attacks, raised preventive strategies. All those must be beneficial to improving programmers' security code consciousness.
Date of Conference: 16-18 July 2010
Date Added to IEEE Xplore: 11 November 2010
ISBN Information: