This resource is no longer available
Attack the Stack: Identifying Unauthorized Code Execution Caused by Buffer Overflows
Did you know that almost half of all critical security leaks in embedded software are due to heap overflows? Additionally, buffer overflows – although making up significantly smaller numbers of attacks than heap overflows – can be exploited in the same way to insert unauthorized code.
In this white paper, learn how to use quality software development and code testing to identify and fix errors and security vulnerabilities in embedded software instead of policing each individual attack. Examine sample illustrations of a stack, how to analyze it, test it, and identify anything that doesn’t look normal.