Design and Implementation of Remote Buffer Overflow and implanted Backdoor
Authors
Xin Zhang, HaiYan Liu
Corresponding Author
Xin Zhang
Available Online November 2012.
- DOI
- 10.2991/citcs.2012.184How to use a DOI?
- Keywords
- Remote buffer overflow; Shellcode; Implanted Backdoor
- Abstract
Network security research focused content is a buffer overflow. It is a technology used by hackers mostly. This paper, based buffer overflow, given the use of the remote overflow implanted backdoor design, and implementation methods. In this paper, introduce the detailed steps to structure Shellcode, as well as the specific implementation of the backdoor. Finally, gives remote overflow prevention recommendations
- Copyright
- © 2012, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Xin Zhang AU - HaiYan Liu PY - 2012/11 DA - 2012/11 TI - Design and Implementation of Remote Buffer Overflow and implanted Backdoor BT - Proceedings of the 2012 National Conference on Information Technology and Computer Science PB - Atlantis Press SP - 725 EP - 728 SN - 1951-6851 UR - https://doi.org/10.2991/citcs.2012.184 DO - 10.2991/citcs.2012.184 ID - Zhang2012/11 ER -