
Automated method of building exploites in analysis software testing
Author(s) -
В. П. Марценюк,
І. Дідманідзе,
Andrii Sverstiuk,
Igor Andrushchak,
Kjell Martin Rud
Publication year - 2020
Publication title -
komp'ûterno-ìntegrovanì tehnologìï: osvìta, nauka, virobnictvo
Language(s) - English
Resource type - Journals
eISSN - 2524-0560
pISSN - 2524-0552
DOI - 10.36910/6775-2524-0560-2020-39-25
Subject(s) - computer science , exploit , software , criticality , task (project management) , vulnerability (computing) , software deployment , reliability engineering , software engineering , systems engineering , engineering , operating system , computer security , physics , nuclear physics
The article discusses the problem of the method of automated construction of exploits for the buffer overflow vulnerability on the stack and its application to the task of evaluating the criticality of errors in software and building software protection. The modern practical and theoretical methods of invading various operating systems are analyzed.