Explain why a process needs to maintain a stack and how the buffer overflow attacks work to subvert the was the stack is used by the process.

Write a report based on your research on (1) viruses that have the ability to gain access to kernel privileges and perform operations at the root administrator level and (2) how the buffer overflow attack exploits the process stack. Additional requirements follow.

 

Topic 1: introduce the topic and describe methods for gaining the kernel / root access. What are some approaches to defeat such attacks? List some well known viruses of this type.

Topic 2: explain why a process needs to maintain a stack and how the buffer overflow attacks work to subvert the was the stack is used by the process. What are some approaches to defeat such attacks? List some well known viruses of this type.

"Get 15% discount on your first 3 orders with us"
Use the following coupon
"FIRST15"

Order Now