Buffer Overflow: Proof Of Concept Implementation

dc.contributor.authorRani, Pooja
dc.contributor.supervisorJain, Sushma
dc.date.accessioned2014-09-04T07:19:23Z
dc.date.available2014-09-04T07:19:23Z
dc.date.issued2014-09-04T07:19:23Z
dc.descriptionME-IS, CSEDen
dc.description.abstractThe Information security vulnerabilities have become a significant concern for the computer users. Buffer Overflows are responsible for many vulnerabilities in the operating system and the application programs. These are mainly results of the programming errors done by the programmers during the coding phase. They can cause serious problems in various categories of software systems. In critical systems, such as health-care, nuclear or aerospace software applications, a buffer overflow may cause severe threats to humans or severe economic losses. If they occur in network or security applications, they can be exploited to gain administrator privileges, perform system attacks, access unauthorized data, or misuse the system. In this thesis work the Proof of concept for the Buffer Overflow attacks has been implemented and analyzed for different types of the application using the Windows XP and Linux Operating System and after that the results are describeden
dc.format.extent1712508 bytes
dc.format.mimetypeapplication/pdf
dc.identifier.urihttp://hdl.handle.net/10266/3149
dc.language.isoenen
dc.subjectBuffer overflowen
dc.subjectMinishareen
dc.subjectAbility FTP Serveren
dc.subjectBig Ant Serveren
dc.titleBuffer Overflow: Proof Of Concept Implementationen
dc.typeThesisen

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
3149.pdf
Size:
1.63 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.78 KB
Format:
Item-specific license agreed upon to submission
Description: