Abstract

In recent decades, the buffer overflow has been a source of many serious security issues. In recent years, by the CERT/CC (Computer Emergency Response Term/Coordination Center) issued advice on the buffer overflow vulnerability for more than accounted for 56.76%. Attack based on the buffer overflow loophole has brought serious harm to computer network. How to effectively eliminate attack based on the buffer overflow loophole has become a question, which everybody pays attention to. This paper first explains the concept of buffer overflow, buffer overflow principle; and then the jump instruction is given using the examples of realization of buffer overflow attacks; and finally, combined with the type of buffer overflow attacks, buffer overflow attacks, raised preventive strategies. All those must be beneficial to improving programmers' security code consciousness.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call