A Study of Buffer Overflow Attacks
M.Rupasri1, P.Rajyalakshmi2, V.Sangeeta3
1M.Rupasri, MCA (M.Tech) Pydah Engineering College, (A.P.), India.
2P. Rajyalakshmi, Asst. Professor, Dept. of CSE, Pydah Engineering College, (A.P.), India.
3V. Sangeeta. Assoc. Professor & Head, Dept. of CSE, Pydah Engineering College, (A.P.), India.
Manuscript received on March 02, 2012. | Revised Manuscript received on March 27, 2012. | Manuscript published on April 30, 2012. | PP: 140-141 | Volume-1 Issue-4, April 2012 | Retrieval Number: D0302041412/2012©BEIESP

Open Access | Ethics and  Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A computer buffer is an area of memory used for temporary storage of data when a program or hardware device needs an uninterrupted flow of information. A buffer overflow occurs when a program or process tries to store more data in a buffer than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information – which has to go somewhere – can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user’s files, change data, or disclose confidential information. This paper presents an overview of the buffer overflow attack and the countermeasures to defend that attack. 
Keywords: Buffer overflow, Function pointers, Heap overflow, Stack overflow.