Understanding Buffer Overflow Attacks: Techniques, Mitigation, and Future Directions

Download
Download is available until
  • Version
  • Download 1
  • File Size 385.55 KB
  • File Count 1
  • Create Date 7 July, 2025
  • Last Updated 7 July, 2025

Authors : Tanvika .B. Padole , Hridaya .S.Thangan

DOI :10.46335/IJIES.2024.9.8.9

Abstract: Buffer overflow attacks remain one of the most prevalent and dangerous security vulnerabilities in computer systems. This research paper provides an in-depth analysis of buffer overflow attacks, exploring their underlying principles, common exploitation techniques, and potential impacts on software and systems. Additionally, this paper discusses various mitigation strategies and countermeasures employed to defend against buffer overflow attacks. Furthermore, it presents current research trends and future directions in the field of buffer overflow prevention and detection. By comprehensively understanding buffer overflow attacks and their mitigations, developers and security practitioners can better safeguard software systems against this persistent threat.