z-logo
open-access-imgOpen Access
DISSAV
Author(s) -
Erik Akeyson,
Harini Ramaprasad,
Meera Sridhar
Publication year - 2022
Publication title -
journal of the colloquium for information system security education
Language(s) - English
Resource type - Journals
eISSN - 2641-4554
pISSN - 2641-4546
DOI - 10.53735/cisse.v9i1.141
Subject(s) - visualization , computer science , stack (abstract data type) , payload (computing) , construct (python library) , call stack , interactive visualization , human–computer interaction , world wide web , multimedia , computer security , operating system , programming language , artificial intelligence , network packet
This paper describes DISSAV: Dynamic Interactive Stack Smashing Attack Visualization, a program visualization tool for teaching stack smashing attacks. DISSAV is a web-based application built with ReactJS. DISSAV provides a simulated attack scenario that guides the user through a three-part stack smashing attack. Our tool allows the user to create a program, construct a payload for it, and execute the program to simulate an attack scenario. We aim to improve student learning of advanced cyber security topics, more specifically, stack smashing attacks, by increasing student engagement and interaction. We incorporate previously researched techniques of Program Visualization tools such as dynamic user input and interactive views to achieve these goals.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here