BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES By: Eric Chien and Peter Szor Presented by: Jesus Morales Introduction &…
Intro Chapter 6 Weaknesses Exploited Weaknesses Bad software is everywhere, and… …flaws can cause security problems In this chapter Various overflow conditions Format…