Authors : Tanvika .B. Padole , Hridaya .S.Thangan
DOI :10.46335/IJIES.2024.9.8.9
Abstract: Buffer overflow attacks remain one of the most prevalent and dangerous security vulnerabilities in computer systems. This research paper provides an in-depth analysis of buffer overflow attacks, exploring their underlying principles, common exploitation techniques, and potential impacts on software and systems. Additionally, this paper discusses various mitigation strategies and countermeasures employed to defend against buffer overflow attacks. Furthermore, it presents current research trends and future directions in the field of buffer overflow prevention and detection. By comprehensively understanding buffer overflow attacks and their mitigations, developers and security practitioners can better safeguard software systems against this persistent threat.
Innovative Scientific Publication,
Nagpur, 440036, India
Email:
ijiesjournal@gmail.com
journalijies@gmail.com
© Copyright 2025 IJIES
Developed By WOW Net Technology