DocumentCode :
2815333
Title :
Vulnerability scanning for buffer overflow
Author :
Iyer, Aishwarya ; Liebrock, Lorie M.
Author_Institution :
Dept. of Comput. Sci., New Mexico Tech., USA
Volume :
2
fYear :
2004
fDate :
5-7 April 2004
Firstpage :
116
Abstract :
With new applications being launched each day, the number of vulnerabilities to attack increases. Attackers find new ways to attack any application they come across. Some attacks are successful because the application is vulnerable due to the vulnerabilities in files assisting in the proper functioning of the application. Although the area of attacks is vast, buffer overflow attacks form the basis for most attacks. Hence it would be a great boon to the software industry if their products were made secure from buffer overflow attacks. This paper introduces a tool, which is used to locate vulnerable files, which in turn have been the root cause for buffer overflow.
Keywords :
DP industry; buffer storage; error handling; network operating systems; security of data; buffer overflow attacks; software industry; vulnerability scanning; vulnerable files; Algorithms; Application software; Buffer overflow; Computer errors; Computer industry; Computer science; Delay; Focusing; Information technology; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on
Print_ISBN :
0-7695-2108-8
Type :
conf
DOI :
10.1109/ITCC.2004.1286600
Filename :
1286600
Link To Document :
بازگشت