Analysis of Buffer Overflow Exploits and Prevention Strategies
2014 ◽
Vol 513-517
◽
pp. 1701-1704
◽
Keyword(s):
With the rapid development of network technology and the emergence of a variety of applications,network security issues became the top priority of the network applications. This article first explains the concept of buffer overflow,and then from the programming language itself flawed,not robust perspective on the emergence,to the emergence of buffer overflow attacks and principle are analyzed in detail,described hackers using buffer overflow attacks the general process,and according to the type of buffer overflow attacks,software development and program runs from two aspects of proposed buffer overflow attack prevention strategy.
2010 ◽
Vol 108-111
◽
pp. 168-171
◽
2013 ◽
Vol 433-435
◽
pp. 1720-1723
2019 ◽
Vol 1
(1)
◽
pp. 574-582
2014 ◽
Vol 687-691
◽
pp. 1892-1895
2003 ◽
Vol 13
(03)
◽
pp. 473-484
◽
2014 ◽
Vol 687-691
◽
pp. 1884-1887
Keyword(s):
2014 ◽
Vol 513-517
◽
pp. 2182-2185
Keyword(s):
2014 ◽
Vol 687-691
◽
pp. 2007-2010