This presentation is part of
a larger package of materials on buffer overflow vulnerabilities, defenses, and software practices.
For more information, go to: http://nsfsecurity.pr.erau.edu
Also available
are:
•Demonstrations of how buffer overflows occur (Java
applets)
•PowerPoint lecture-style
presentations on an introduction to buffer overflows, preventing buffer overflows (for C programmers), and a
case study of Code Red
•Checklists and Points to Remember for C Programmers
•An interactive module and
quiz set with alternative paths for journalists/analysts and IT managers as well as programmers and testers
•A scavenger hunt on
implications of the buffer overflow vulnerability