•This presentation is part of a larger package of materials on buffer
overflow vulnerabilities, defenses, and
software practices.
For more
information, go to: http://nsfsecurity.pr.erau.edu
•
•Also available are:
–Demonstrations of how buffer overflows occur (Java
applets)
–PowerPoint lecture-style presentations on an introduction
to buffer overflows, preventing buffer overflows
(for C programmers), and a case study of Code Red
–Checklists and Points to Remember for C Programmers
–An interactive module and quiz set with alternative paths
for journalists/analysts and IT managers as
well as programmers and testers
–A scavenger hunt on implications of the buffer overflow
vulnerability