From the course: Developing Secure Software (2015)
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Buffer overflow countermeasures
From the course: Developing Secure Software (2015)
Buffer overflow countermeasures
- Buffer overflow attacks are common, and therefore there exist relatively well-developed countermeasures against them. The first option is to use a programming language that supports automatic bounds checking of buffers. These languages include Java and Python. A better solution is architectural and to use a built in language specific library module that implements info validation in the form of safe buffer handling. To check if there are any missed opportunities for properly managing the buffers, it is recommended to use a code scanning tool to detect the presence of any buffer overflow vulnerabilities. Compilers can also alert the programmers when an unsafe function call is made. In more advance compilers can compile a program so that protection against buffer overflow attacks can automatically be compiled in with the program. Finally, your Operating System can also be written to make buffer overflow attacks more difficult to launch. For example, the Operating System can enforce…
Contents
-
-
-
-
-
-
Setting the stage34s
-
(Locked)
Buffer overflow attacks1m 41s
-
(Locked)
Buffer overflow countermeasures1m 44s
-
(Locked)
Broken authentication and session management1m 7s
-
(Locked)
Broken authentication and session management countermeasures2m 1s
-
(Locked)
Insecure direct object references1m 24s
-
(Locked)
Insecure direct object references countermeasures52s
-
(Locked)
Sensitive information exposure1m 6s
-
(Locked)
Sensitive data exposure countermeasures1m 37s
-
(Locked)
Other secure coding best practices2m 22s
-
-
-
-