This presentation is part
of a larger package of materials on buffer overflow vulnerabilities, defenses, and software
practices.
For more information, go to: http://nsfsecurity.pr.erau.edu
Also available are:
•Demonstrations of how buffer overflows occur (Java
applets)
•PowerPoint lecture-style presentations on an introduction
to buffer overflows, preventing buffer overflows
(for C programmers), and a case study of Code Red
•Checklists and Points to Remember for C Programmers
•An interactive module and quiz set with alternative paths
for journalists/analysts and IT managers as well as
programmers and testers
•A scavenger hunt on implications of the buffer overflow
vulnerability