Download presentation
Presentation is loading. Please wait.
1
FIGURE 14.1 Security is a Consequence of People, Process, and Technology.
2
FIGURE 14. 2 Illustration of Stack Buffer Overflow
FIGURE 14.2 Illustration of Stack Buffer Overflow. (A) A normal stack frame. (B) A stack frame with an input variable within the bounds of the allocated stack buffer. (C) A stack frame with an input variable that is longer than the allocated stack buffer. In this case, the malicious input begins with assembly encoded executable exploit code, some padded bytes, and ends with the address of the beginning of the exploit code. This final address overruns the return address of the previous stack frame and, hence, will turn control of the flow of execution over to the exploit code.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.