This presentation is part of
a larger package of materials on buffer overflow vulnerabilities, defenses, and
software practices.
For more information, go to: http://nsfsecurity.pr.erau.edu
Also available
are:
•Demonstrations of how buffer
overflows occur (Java applets)
•PowerPoint lecture-style
presentations on an introduction to buffer overflows, preventing buffer overflows (for C programmers), and a case study of Code
Red
•Checklists and Points to
Remember for C Programmers
•An interactive module and
quiz set with alternative paths for journalists/analysts and IT managers as well as programmers and testers
•A scavenger hunt on
implications of the buffer overflow vulnerability