Proceedings of the 2018 3rd Joint International Information Technology,Mechanical and Electronic Engineering Conference (JIMEC 2018)

The Source and Exploitation of the Program Vulnerability

Authors
Li jian, Lou jing, Gao Yang
Corresponding Author
Li jian
Available Online December 2018.
DOI
10.2991/jimec-18.2018.19How to use a DOI?
Keywords
vulnerabilities, exploit, attack
Abstract

Vulnerabilities with the C and C ++ language programming are the source of information security incidents. The language is an insecure programming language, which allows an attacker to change the behavior of the running program or completely control it through the vulnerabilities in the program. This issue has been known for more than 30 years. During this period, many vulnerability mitigation technologies have been proposed to prevent the exploitation of the vulnerabilities. However, many facts have proven that these mitigation technologies can not completely solve the problem. This paper clearly illustrates that the flaws and errors of C and C ++ language are the fundamental cause of the vulnerability generation. Then, the paper further analyzes the vulnerabilities generated by the flaws and errors as well as the implementation attacks by exploiting the vulnerabilities. Lastly, this paper also points out the key to the successful implementation attacks by exploiting these vulnerabilities.

Copyright
© 2019, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2018 3rd Joint International Information Technology,Mechanical and Electronic Engineering Conference (JIMEC 2018)
Series
Atlantis Highlights in Engineering
Publication Date
December 2018
ISBN
10.2991/jimec-18.2018.19
ISSN
2589-4943
DOI
10.2991/jimec-18.2018.19How to use a DOI?
Copyright
© 2019, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Li jian
AU  - Lou jing
AU  - Gao Yang
PY  - 2018/12
DA  - 2018/12
TI  - The Source and Exploitation of the Program Vulnerability
BT  - Proceedings of the 2018 3rd Joint International Information Technology,Mechanical and Electronic Engineering Conference (JIMEC 2018)
PB  - Atlantis Press
SP  - 89
EP  - 94
SN  - 2589-4943
UR  - https://doi.org/10.2991/jimec-18.2018.19
DO  - 10.2991/jimec-18.2018.19
ID  - jian2018/12
ER  -