•This presentation is part of a larger package of
materials on buffer overflow vulnerabilities, defenses,
and software practices.
For more information, go to: http://nsfsecurity.pr.erau.edu
•
•Also available are:
–Demonstrations of how buffer overflows occur (Java applets)
–PowerPoint lecture-style presentations on an introduction to buffer
overflows, preventing buffer overflows
(for C programmers), and a case study of Code Red
–Checklists and Points to Remember for C Programmers
–An interactive module and quiz set with alternative paths for
journalists/analysts and IT managers as well as
programmers and testers
–A scavenger hunt on implications of the buffer overflow vulnerability