¸This
presentation is part of a larger package of materials on buffer overflow
vulnerabilities, defenses, and software practices. For
more information, go to: http://nsfsecurity.pr.erau.edu
¸
¸Also available are:
–Demonstrations of how buffer overflows occur (Java applets)
–PowerPoint lecture-style presentations on an introduction to buffer
overflows, preventing buffer overflows (for C
programmers), and a case study of Code Red
–Checklists and Points to Remember for C Programmers
–An interactive module and quiz set with alternative paths for
journalists/analysts and IT managers as well as
programmers and testers
–A scavenger hunt on implications of the buffer overflow vulnerability