A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Design and Implementation of Remote Buffer Overflow and implanted Backdoor
2012
Proceedings of 2012 National Conference on Information Technology and Computer Science
unpublished
Network security research focused content is a buffer overflow. It is a technology used by hackers mostly. This paper, based buffer overflow, given the use of the remote overflow implanted backdoor design, and implementation methods. In this paper, introduce the detailed steps to structure Shellcode, as well as the specific implementation of the backdoor. Finally, gives remote overflow prevention recommendations.
doi:10.2991/citcs.2012.184
fatcat:jxehj4cunbcsxoriozp35ed2ka