This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Techniques for Defending from Buffer Overflow Vulnerability Security Exploits
PrePrint
ISSN: 1089-7801
Bindu Padmanabhuni, Nanyang Technological University, Singapore
Hee Beng Kuan Tan, Nanyang Technological University, Singapore
Recent reports reveal that majority of security violations are caused by weaknesses in code. Buffer overflow vulnerability is the most severe of security violations. Though wide range of solutions from static analysis techniques to hardware modifications were proposed to tackle the vulnerability they either fail to address the large scope of the problem or have limitations preventing their use and adoption. In this article, we discuss well-known buffer overflow vulnerability exploit mechanisms followed by comprehensive study of proposals for defending from such exploits along with review of tools used for supporting the process.
Index Terms:
D Software/Software Engineering, K.6.5 Security and Protection, software engineering, Program Verification, Database Reverse Engineering, C.2 Communication/Networking and Information Technology, Multimedia Information Systems, H.3.5 Online Information Services, web programming, web applications, Pervasive computing, mobile applications, Internet applications, database technology, Computer-supported cooperative work, B Hardware, C Computer Systems Organization, D Software/Software Engineering, I.4 Image Processing and Computer Vision, D Software/Software Engineering, K.6.5 Security and Protection,
Citation:
Bindu Padmanabhuni, Hee Beng Kuan Tan, "Techniques for Defending from Buffer Overflow Vulnerability Security Exploits," IEEE Internet Computing, 19 Sept. 2011. IEEE computer Society Digital Library. IEEE Computer Society, <http://doi.ieeecomputersociety.org/10.1109/MIC.2011.137>
Usage of this product signifies your acceptance of the Terms of Use.