Dear Guest, Please Register to Download Free Seminar Reports and PPT of each topic. The Download link will be visible only after the registration.Please search the topic before posting.

Please click the Facebook Like Button if you are satisfied

 Subscribe To Get Latest Seminar Reports and PPT

Receive all seminar updates via Facebook. Just Click the Like Button Below



Huge Collection of Information Technology Seminar Topics, Reports and PPT.


Postby manognalingala » Fri Jan 27, 2012 6:42 am

please send me reports for
1. Buffer overflow attack : A potential problem and its Implications
Posts: 2
Joined: Fri Jan 27, 2012 6:32 am


Postby Prasanth » Fri Jan 27, 2012 3:25 pm

Buffer overflows have been the most common form of security vulnerability in the last ten years. More over, buffer overflow vulnerabilities dominate in the area of remote network penetration vulnerabilities, where an anonymous Internet user seeks to gain partial or total control of a host. Because these kinds of attacks enable anyone to take total control of a host, they represent one of the most serious classes security threats. Buffer overflow attacks form a substantial portion of all security attacks simply because buffer overflow vulnerabilities are so common [15] and so easy to exploit [30, 28, 35, 20]. However, buffer overflow vulnerabilities particularly dominate in the class of remote penetration attacks because a buffer overflow vulnerability presents the attacker with exactly what they need: the ability to inject and execute attack code. The injected attack code runs with the privileges of the vulnerable program, and allows the attacker to bootstrap whatever other functionality is needed to control (“own” in the underground vernacular) the host computer.

For instance, among the five “new” “remote tolocal” attacks used in the 1998 Lincoln Labs intrusion detection evaluation, three were essentially social engineering attacks that snooped user credentials, and two were buffer overflows. 9 of 13 CERT advisories from 1998 involved buffer overflows [34] and at least half of 1999 CERT advisories involve buffer overflows [5]. An informal survey on the Bugtraq security vulnerability mailing list [29] showed that approximately 2/3 of respondents felt that buffer overflows are the leading cause of security vulnerability

Seminar By Crispin Cowan, Perry Wagle, Calton Pu,Steve Beattie, and Jonathan Walpole, Department of Computer Science and Engineering
Reference :
User avatar
Site Admin
Posts: 488
Joined: Sat May 28, 2011 6:29 pm

Return to Information Technology Seminar Topics