Attack the Stack: Identifying Unauthorized Code Execution Caused by Buffer Overflows by CoverityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Research Abstract
Attack the Stack: Identifying Unauthorized Code Execution Caused by Buffer Overflows
by Coverity

> View this now

Published on: July 25, 2012
Type of content: WHITE PAPER
Format: Unknown
Length: 3 pages
Price: FREE

Overview:

Did you know that almost half of all critical security leaks in embedded software are due to heap overflows? Additionally, buffer overflows ā€“ although making up significantly smaller numbers of attacks than heap overflows ā€“ can be exploited in the same way to insert unauthorized code.


In this white paper, learn how to use quality software development and code testing to identify and fix errors and security vulnerabilities in embedded software instead of policing each individual attack. Examine sample illustrations of a stack, how to analyze it, test it, and identify anything that doesnā€™t look normal.

> View Company Report
> View all content by this company
> Return to Search Results


         
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts