DocumentCode :
3183388
Title :
A Checklist Based Approach for the Mitigation of Buffer Overflow Attacks
Author :
Pandey, S.K. ; Mustafa, K. ; Ahson, S.I.
Author_Institution :
Jamia Millia Islamia (Central Univ.), New Delhi
fYear :
2007
fDate :
13-15 Dec. 2007
Firstpage :
115
Lastpage :
117
Abstract :
Buffer overflows has appear to be one of the most common problems in the area of software security. Many of the buffer overflow problems are probably the result of careless programming, which might have been found and corrected by the developers, before releasing the software. The work presented in this paper is intended to detect and prevent such buffer overflow vulnerabilities. In this paper, two separate checklists are proposed to both programmers as well as test engineers for verifying the software during coding and testing phases respectively for building secure software.
Keywords :
security of data; telecommunication security; buffer overflow attacks; coding; software security; Assembly; Buffer overflow; Buffer storage; Computer science; Data security; Phase detection; Programming profession; Runtime; Secure storage; Software testing; Attacks; Buffer Overflow; Checklist; Software Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communication and Sensor Networks, 2007. WCSN '07. Third International Conference on
Conference_Location :
Allahabad
Print_ISBN :
978-1-4244-1877-0
Electronic_ISBN :
978-1-4244-1878-7
Type :
conf
DOI :
10.1109/WCSN.2007.4475759
Filename :
4475759
Link To Document :
بازگشت