Title :
Vulnerability scanning for buffer overflow
Author :
Iyer, Aishwarya ; Liebrock, Lorie M.
Author_Institution :
Dept. of Comput. Sci., New Mexico Tech., USA
Abstract :
With new applications being launched each day, the number of vulnerabilities to attack increases. Attackers find new ways to attack any application they come across. Some attacks are successful because the application is vulnerable due to the vulnerabilities in files assisting in the proper functioning of the application. Although the area of attacks is vast, buffer overflow attacks form the basis for most attacks. Hence it would be a great boon to the software industry if their products were made secure from buffer overflow attacks. This paper introduces a tool, which is used to locate vulnerable files, which in turn have been the root cause for buffer overflow.
Keywords :
DP industry; buffer storage; error handling; network operating systems; security of data; buffer overflow attacks; software industry; vulnerability scanning; vulnerable files; Algorithms; Application software; Buffer overflow; Computer errors; Computer industry; Computer science; Delay; Focusing; Information technology; Testing;
Conference_Titel :
Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on
Print_ISBN :
0-7695-2108-8
DOI :
10.1109/ITCC.2004.1286600