Current filters:

Search Results

  • <<
  • 1
  • >>
Item hits:
  • Thesis

  • Authors: Zhu, Ge (2006)

  • Buffer overflow happens when the runtime process loads more data into the buffer than its design capacity. Bad programming style and lack of security concern cause overflow vulnerabilities in almost all applications on all the platforms. As a common vulnerability, buffer overflow accounts for more than 20% of the public vulnerabilities reported in Common Vulnerabilities and Exposures (version 20040901). Buffer overflow attack can target any data in stack or heap. A common target of overflow attack is return address stored in the stack during runtime. By overflowing the return address, the attacker could redirect the program control flow when the current function returns. Many solutions have been proposed to protect return address from being overflowed, like StackGaurd, StackShield ...