I have recently read the news about Google Chrome Buffer Overflow vulnerability (see this link). Admittedly, I was ignorant enough not to understand how a buffer overflow can cause severe security breaches! Wikipedia came to the rescue, as well as some research into the topic of Assembly-language programming. At last I can understand how SEVERE such an attack could be!
You can dig for it too ;-)
check the Wikipedia article,
http://en.wikipedia.org/wiki/Buffer_overflow
and the excellent book of Programming from the Ground Up, for much better understanding of Assembly:
http://savannah.nongnu.org/projects/pgubook/
Enjoy!
Popular Posts
-
I have recently read the news about Google Chrome Buffer Overflow vulnerability (see this link ). Admittedly, I was ignorant enough not to u...
-
Today I had the opportunity to attend a session given by Dr. Moustafa Youssef on his research. The key point in his talk was about detectin...
-
I couldn't believe it... Check the EUL website NOW www.eul.edu.eg
-
From the gcc man page: -dCHARS CHARS is a sequence of one or more of the following characters, and must not be preceded by a spac...
-
At the time I visited this article it was rated 4 out of 5 which is very good! http://zone.ni.com/devzone/cda/tut/p/id/6349
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment