This resource is no longer available

Attack the Stack: Identifying Unauthorized Code Execution Caused by Buffer Overflows

Cover

Did you know that almost half of all critical security leaks in embedded software are due to heap overflows? Additionally, buffer overflows – although making up significantly smaller numbers of attacks than heap overflows – can be exploited in the same way to insert unauthorized code.

In this white paper, learn how to use quality software development and code testing to identify and fix errors and security vulnerabilities in embedded software instead of policing each individual attack. Examine sample illustrations of a stack, how to analyze it, test it, and identify anything that doesn’t look normal.

Vendor:
Coverity
Posted:
25 Jul 2012
Published:
25 Jul 2012
Format:
PDF
Length:
3 Page(s)
Type:
White Paper
Language:
English

This resource is no longer available.