The Source and Exploitation of the Program Vulnerability
- DOI
- 10.2991/jimec-18.2018.19How to use a DOI?
- Keywords
- vulnerabilities, exploit, attack
- Abstract
Vulnerabilities with the C and C ++ language programming are the source of information security incidents. The language is an insecure programming language, which allows an attacker to change the behavior of the running program or completely control it through the vulnerabilities in the program. This issue has been known for more than 30 years. During this period, many vulnerability mitigation technologies have been proposed to prevent the exploitation of the vulnerabilities. However, many facts have proven that these mitigation technologies can not completely solve the problem. This paper clearly illustrates that the flaws and errors of C and C ++ language are the fundamental cause of the vulnerability generation. Then, the paper further analyzes the vulnerabilities generated by the flaws and errors as well as the implementation attacks by exploiting the vulnerabilities. Lastly, this paper also points out the key to the successful implementation attacks by exploiting these vulnerabilities.
- Copyright
- © 2019, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Li jian AU - Lou jing AU - Gao Yang PY - 2018/12 DA - 2018/12 TI - The Source and Exploitation of the Program Vulnerability BT - Proceedings of the 2018 3rd Joint International Information Technology,Mechanical and Electronic Engineering Conference (JIMEC 2018) PB - Atlantis Press SP - 89 EP - 94 SN - 2589-4943 UR - https://doi.org/10.2991/jimec-18.2018.19 DO - 10.2991/jimec-18.2018.19 ID - jian2018/12 ER -