Cited By
View all- Apeko JTurner C(2023)Stack-Based Buffer Overflow Implementation Using Python 3Intelligent Computing10.1007/978-3-031-37717-4_81(1227-1239)Online publication date: 1-Sep-2023
Buffer overflow attack is the main attack method that most if not all existing malicious worms use to propagate themselves from machine to machine. Although a great deal of research has been invested in defense mechanisms against buffer overflow attack, ...
Buffer overflows have become the most common target for network-based attacks. They are also the primary mechanism used by worms and other forms of automated attacks. Although many techniques have been developed to prevent server compromises due to ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in