Exploit Development Research on x86 Windows Application: Buffer Overflow

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

The Best way to find vulnerability present with an application is to presume you as Hacker and act accordingly. Hackers always find one or other way to bypass all the security measures taken by the developers. So before releasing a developed software application, it

Authors and Affiliations

Keywords

Related Articles

Mitigation of Voltage Sag and Swell by Using Magnitude Tracking Method

Our project proposes a concept to mitigate the voltage sag and swell. There are three types of voltages is being considered. Normal voltage, Lower voltage (sag), Higher voltage (swell) .Normal voltage is being considered...

Low Noise Amplifier (LNA) Design for 57 Ghz to 63 Ghz EHF Narrow Band Systems

Low Noise Amplifier (LNA) of single stage on inductive source degeneration structure for Extremely High Frequency (EHF) is proposed in this paper. The presented LNA for 57GHz-63GHz narrow band system is implemented on 90...

FPGA Based Architecture for Radar Information Analysis

: Radar is an object-detection system that uses radio waves to determine the range, altitude, direction, or speed of objects. The radar transmitter transmits pulses of radio waves or microwaves that bounce off any object...

Privacy Preserved Encrypted Cloud Data Access

Several alternatives exist for storage services with the guarantee of security and availability for data at rest, in motion, and in use. In a cloud context, security can improve due to centralization of data, increased s...

Design of IEEE - 754 Floating point Arithmetic Processor

Design of IEEE - 754 Floating point Arithmetic Processor

Download PDF file
  • EP ID EP356985
  • DOI -
  • Views 65
  • Downloads 0

How To Cite

(2015). Exploit Development Research on x86 Windows Application: Buffer Overflow. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk./articles/-A-356985