Attack the Stack: Identifying Unauthorized Code Execution Caused by Buffer Overflows
sponsored by Coverity

Did you know that almost half of all critical security leaks in embedded software are due to heap overflows? Additionally, buffer overflows – although making up significantly smaller numbers of attacks than heap overflows – can be exploited in the same way to insert unauthorized code.

In this white paper, learn how to use quality software development and code testing to identify and fix errors and security vulnerabilities in embedded software instead of policing each individual attack. Examine sample illustrations of a stack, how to analyze it, test it, and identify anything that doesn’t look normal.

(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from Coverity
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement