•This presentation is part of a larger package of
materials on buffer overflow vulnerabilities,
defenses, and software practices.
For more
information, go to: http://nsfsecurity.pr.erau.edu
•
•Also available are:
–Demonstrations of how buffer overflows occur (Java
applets)
–PowerPoint lecture-style presentations on an introduction
to buffer overflows, preventing buffer
overflows (for C programmers), and a case study of Code Red
–Checklists and Points to Remember for C Programmers
–An interactive module and quiz set with alternative paths
for journalists/analysts and IT managers
as well as programmers and testers
–A scavenger hunt on implications of the buffer overflow
vulnerability