Buffer Overflow: Proof Of Concept Implementation
| dc.contributor.author | Rani, Pooja | |
| dc.contributor.supervisor | Jain, Sushma | |
| dc.date.accessioned | 2014-09-04T07:19:23Z | |
| dc.date.available | 2014-09-04T07:19:23Z | |
| dc.date.issued | 2014-09-04T07:19:23Z | |
| dc.description | ME-IS, CSED | en |
| dc.description.abstract | The Information security vulnerabilities have become a significant concern for the computer users. Buffer Overflows are responsible for many vulnerabilities in the operating system and the application programs. These are mainly results of the programming errors done by the programmers during the coding phase. They can cause serious problems in various categories of software systems. In critical systems, such as health-care, nuclear or aerospace software applications, a buffer overflow may cause severe threats to humans or severe economic losses. If they occur in network or security applications, they can be exploited to gain administrator privileges, perform system attacks, access unauthorized data, or misuse the system. In this thesis work the Proof of concept for the Buffer Overflow attacks has been implemented and analyzed for different types of the application using the Windows XP and Linux Operating System and after that the results are described | en |
| dc.format.extent | 1712508 bytes | |
| dc.format.mimetype | application/pdf | |
| dc.identifier.uri | http://hdl.handle.net/10266/3149 | |
| dc.language.iso | en | en |
| dc.subject | Buffer overflow | en |
| dc.subject | Minishare | en |
| dc.subject | Ability FTP Server | en |
| dc.subject | Big Ant Server | en |
| dc.title | Buffer Overflow: Proof Of Concept Implementation | en |
| dc.type | Thesis | en |
