Proceedings of the 7th International Conference on Education, Management, Information and Computer Science (ICEMC 2017)

Survey of Attacks and Defenses on Stack-based Buffer Overflow Vulnerability

Authors
Wang Wei
Corresponding Author
Wang Wei
Available Online June 2016.
DOI
https://doi.org/10.2991/icemc-17.2017.64How to use a DOI?
Keywords
Buffer overflow; Stack; Attack; Defense; C/C++
Abstract
With the rapid development of computer and related information technologies, risks associated with computer system are increasingly rampant[1]. And buffer overflow vulnerability is still the primary mean used by many hackers to attack soft application especially developed in unsafe programming languages like C or C++, although it has been exiting for two decades. A variety of corresponding defenses has been proposed and hackers also continue to come up with new attack methods to bypass the defense. This article mainly introduces the concept of stack-based buffer overflow and then discusses current main attacks and corresponding defenses based on the stack-based buffer overflow.
Open Access
This is an open access article distributed under the CC BY-NC license.

Download article (PDF)

Cite this article

TY  - CONF
AU  - Wang Wei
PY  - 2016/06
DA  - 2016/06
TI  - Survey of Attacks and Defenses on Stack-based Buffer Overflow Vulnerability
BT  - Proceedings of the 7th International Conference on Education, Management, Information and Computer Science (ICEMC 2017)
PB  - Atlantis Press
SP  - 324
EP  - 328
SN  - 2352-538X
UR  - https://doi.org/10.2991/icemc-17.2017.64
DO  - https://doi.org/10.2991/icemc-17.2017.64
ID  - Wei2016/06
ER  -