Survey of Attacks and Defenses on Stack-based Buffer Overflow Vulnerability
- DOI
- 10.2991/icemc-17.2017.64How to use a DOI?
- Keywords
- Buffer overflow; Stack; Attack; Defense; C/C++
- Abstract
With the rapid development of computer and related information technologies, risks associated with computer system are increasingly rampant[1]. And buffer overflow vulnerability is still the primary mean used by many hackers to attack soft application especially developed in unsafe programming languages like C or C++, although it has been exiting for two decades. A variety of corresponding defenses has been proposed and hackers also continue to come up with new attack methods to bypass the defense. This article mainly introduces the concept of stack-based buffer overflow and then discusses current main attacks and corresponding defenses based on the stack-based buffer overflow.
- Copyright
- © 2017, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Wang Wei PY - 2016/06 DA - 2016/06 TI - Survey of Attacks and Defenses on Stack-based Buffer Overflow Vulnerability BT - Proceedings of the 7th International Conference on Education, Management, Information and Computer Science (ICEMC 2017) PB - Atlantis Press SP - 324 EP - 328 SN - 2352-538X UR - https://doi.org/10.2991/icemc-17.2017.64 DO - 10.2991/icemc-17.2017.64 ID - Wei2016/06 ER -