¸This
presentation is part of a larger package of materials on buffer overflow
vulnerabilities, defenses, and software
practices. For more information,
go to: http://nsfsecurity.pr.erau.edu
¸
¸Also available are:
–Demonstrations of how buffer overflows occur (Java
applets)
–PowerPoint lecture-style presentations on an introduction
to buffer overflows, preventing buffer overflows
(for C programmers), and a case study of Code Red
–Checklists and Points to Remember for C Programmers
–An interactive module and quiz set with alternative paths
for journalists/analysts and IT managers as
well as programmers and testers
–A scavenger hunt on implications of the buffer overflow
vulnerability