Proceedings of the 2012 National Conference on Information Technology and Computer Science

Design and Implementation of Remote Buffer Overflow and implanted Backdoor

Authors
Xin Zhang, HaiYan Liu
Corresponding Author
Xin Zhang
Available Online November 2012.
DOI
10.2991/citcs.2012.184How to use a DOI?
Keywords
Remote buffer overflow; Shellcode; Implanted Backdoor
Abstract

Network security research focused content is a buffer overflow. It is a technology used by hackers mostly. This paper, based buffer overflow, given the use of the remote overflow implanted backdoor design, and implementation methods. In this paper, introduce the detailed steps to structure Shellcode, as well as the specific implementation of the backdoor. Finally, gives remote overflow prevention recommendations

Copyright
© 2012, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2012 National Conference on Information Technology and Computer Science
Series
Advances in Intelligent Systems Research
Publication Date
November 2012
ISBN
978-94-91216-39-8
ISSN
1951-6851
DOI
10.2991/citcs.2012.184How to use a DOI?
Copyright
© 2012, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Xin Zhang
AU  - HaiYan Liu
PY  - 2012/11
DA  - 2012/11
TI  - Design and Implementation of Remote Buffer Overflow and implanted Backdoor
BT  - Proceedings of the 2012 National Conference on Information Technology and Computer Science
PB  - Atlantis Press
SP  - 725
EP  - 728
SN  - 1951-6851
UR  - https://doi.org/10.2991/citcs.2012.184
DO  - 10.2991/citcs.2012.184
ID  - Zhang2012/11
ER  -