Title: Windows Buffer Overflow Exploit Code Analysis
Abstract: In this paper we first introduce the principle and attack methods of buffer overflow. Then analyze the structure and features of buffer overflow exploit code and summarize the characters of the code. We also discuss how to use these characters into intrusion detection systems and point out the new develop trend in intrusion detection using the system call character.
Publication Year: 2008
Publication Date: 2008-01-01
Language: en
Type: article
Access and Citation
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot