Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
5Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Overview on Security Programing

Overview on Security Programing

Ratings: (0)|Views: 243 |Likes:
Published by anirudhabanerjee

More info:

Published by: anirudhabanerjee on Nov 23, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/21/2011

pdf

text

original

 
Vrije Universiteit BrusselFaculteit WetenschappenDepartement Informatica en ToegepasteInformatica
      V
     R
         I
    J
    E
   U
   N
  I
  V
 E
 R
S
I
I  
T  
B  
R   
U    
S    
S     
E     
L      S      
C     
I     
E    
N    
T    
I   
A  
V  
I  
C
E
 R
 E
T
  E
   N
   E
    B
    R
    A
      S
An overview of common programmingsecurity vulnerabilities and possible solutions
Proefschrift ingediend met het oog op het behalen van de graad van Licentiaat inde InformaticaDoor: Yves YounanPromotor: Prof. Dr. D. VermeirAugustus 2003
 
Dedicated to the memory of Yolande De Moor, my mother (1944-2000).
 
Abstract
Programming security vulnerabilities are the most common cause of software se-curity breaches in current day computing. While these can easily be avoided byan attentive programmer, many programs still contain these kinds of vulnerabil-ities. This document will describe what the most commonly occuring ones areand will then explain how these can be abused to make a program do somethingit did not intend to do. We will then take a look at how a recent vulnerabilityin popular piece of software was exploited to allow an attacker to take control of the execution flow of that program. Several solutions exist to detect and preventmany, though not all, of the vulnerabilities described in this document in existingprograms without requiring source code modifications, and in some cases withouteven requiring access to the source code to the applications. We will take an in-depth look at how these solutions are implemented and what their effects are onlegitimate programs, how they attempt to mitigate the restrictions they impose andwhat their impact is on the performance of the programs they attempt to protect.We will also describe if and how these solutions can be bypassed.

Activity (5)

You've already reviewed this. Edit your review.
1 hundred reads
vijayang liked this
vijayang liked this
vijayang liked this
avsec liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->