You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4Lines changed: 4 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,9 @@
1
1
# Buffer Overflow Attacks and Defenses
2
2
3
+
## Highlights
4
+
- Demonstrated the Stack based and Heap based buffer overflow exploits along with their special cases: Return to LibC, Off by One and Use after Free using **C** and **x86**
5
+
- Performed a detailed case study on the Code Red Worm which was based on buffer overflow.
6
+
3
7
## Report
4
8
Our report can be found [here](CA_project_report.pdf). Google Doc format is available [here](https://docs.google.com/document/d/1AmAk06TibGtbptpQdKRczXb6kIlK2gr4vX0ItTSDihw/edit).
5
9
The Case Study report can be found [here](Case_Study.pdf). Google Doc format is available [here](https://docs.google.com/document/d/1rozTiq1NAdtuTRSlfEgJkvYBf4AnLFJ8k3ZZV7EZ0qQ/edit?usp=sharing).
0 commit comments