Activity 1 - Buffer Overflows in C

Authors

  • Harini Ramaprasad University of North Carolina at Charlotte
  • Meera Sridhar University of North Carolina at Charlotte
  • Yates Snyder

Abstract

This is the first in a series of activities designed to teach students about stack smashing attacks and defenses. This specific activity teaches students about the concept of buffer overflows and how there is a potential for their occurence in C programs that accept command-line parameters and use unsafe functions such as strcpy().

Level: Undergraduate
Setting: Classroom
Type: Learning Cycle
Discipline: Computer Science
Course: Cybersecurity
Keywords:  buffer overflow, memory, string copy, unsafe functions

ToC Image: A Program in C Reading a String Array

Downloads

Published

2024-12-03

How to Cite

Ramaprasad, H., Sridhar, M., & Snyder, Y. (2024). Activity 1 - Buffer Overflows in C. POGIL Activity Clearinghouse, 5(1). Retrieved from https://pac.pogil.org/index.php/pac/article/view/416

Issue

Section

Activities for Review