Buffer Overflow Attacks and Their Countermeasures
All the methods/tools described above are limited in one manner or another. No tool can solve completely the problem of buffer overflow, but they surely can decrease the probability of stack smashing attacks. However, code scrutiny (writing secure code) is still the best possible solution to these attacks. Programmers should be educated to prevent/minimize the use of standard unsafe functions. In addition, no warning given by the compiler should be taken lightly. With time and increasing awareness among developers, buffer overflow problems are predicted to decrease in importance and frequency. Security-related issues are still expected to be around, though, by various other means.
"Smashing the Stack for Fun and Profit", by Aleph One.
Openwall Project, Linux patch with non-executable stack version.
Sandeep Grover works as a Software Engineer with Quicklogic, India. He holds a Bachelor's Degree in Computer Science from the Institute of Technology, BHU, India. His research interests lie in compilers, EDA and computer architecture.
- Readers' Choice Awards 2013
- Mars Needs Women
- RSS Feeds
- Sublime Text: One Editor to Rule Them All?
- Raspberry Pi: the Perfect Home Server
- December 2013 Issue of Linux Journal: Readers' Choice
- IBM Will Minimize Impact of Future Disasters
- Tech Tip: Really Simple HTTP Server with Python
- Linux Systems Administrator
- Senior Perl Developer
4 min 37 sec ago
- This should be very helpful
1 hour 18 min ago
- As much as I share your point
3 hours 38 min ago
- So girls had it better ?
7 hours 9 min ago
- Reply to comment | Linux Journal
7 hours 30 min ago
- why is GNOME 3 in the fifth position at 14.1 %?
13 hours 2 min ago
- Sublime Is Brilliant!
18 hours 5 min ago
18 hours 24 min ago
- Rapid[Disk,Cache] better than native ram caching?
18 hours 49 min ago
- Nothing is perfect
19 hours 2 min ago