Over a decade ago, buffer overflow has caused immense security vulnerability and still continues. Just using few tools hackers are able to exploit the software applications and merge their attack code in applications. In this paper, I have discussed buffer overflow exploits and various mitigation techniques for windows and Linux platforms. Apart from that, I have discussed how we can prevent buffer overflow vulnerabilities by using combinations of different mitigation techniques while preserving the functionality and performance of the system.

Read the International Journal of Advanced and Innovative Research (2278-7844)/#1/Volume 6 issue 9 for more details.

Share: