This paper is published in Volume-4, Issue-6, 2018
Area
Information Security
Author
Vikrant Chatole, Gauransh Nagar
Org/Univ
Ajeenkya D.Y. Patil University, Pune, Maharashtra, India
Keywords
Buffer overflow, Ethical hacking, Information security
Citations
IEEE
Vikrant Chatole, Gauransh Nagar. Buffer overflow: Mechanism and countermeasures, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Vikrant Chatole, Gauransh Nagar (2018). Buffer overflow: Mechanism and countermeasures. International Journal of Advance Research, Ideas and Innovations in Technology, 4(6) www.IJARIIT.com.
MLA
Vikrant Chatole, Gauransh Nagar. "Buffer overflow: Mechanism and countermeasures." International Journal of Advance Research, Ideas and Innovations in Technology 4.6 (2018). www.IJARIIT.com.
Vikrant Chatole, Gauransh Nagar. Buffer overflow: Mechanism and countermeasures, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Vikrant Chatole, Gauransh Nagar (2018). Buffer overflow: Mechanism and countermeasures. International Journal of Advance Research, Ideas and Innovations in Technology, 4(6) www.IJARIIT.com.
MLA
Vikrant Chatole, Gauransh Nagar. "Buffer overflow: Mechanism and countermeasures." International Journal of Advance Research, Ideas and Innovations in Technology 4.6 (2018). www.IJARIIT.com.
Abstract
The invention of Computers, Information Technology and thence Internet has led humanity to a new era of revolution. We, as humans, have stored more data in last 20 years than the whole human history. In May 2018 Forbes announced that we have created 90% of data all data in the past two years. That describes the way information storage and usage is picking up pace. But are our basic pillars of storing data and processing full proof and completely secure? Buffer Overflow is currently the most hostile vulnerability in the basics of information storage and processing of our computing technology. The paper discusses this vulnerability in thorough details. Ways systems are coping up with this and methods used to overcome this vulnerability present in the basics of our most important invention.