Activity 1 - Buffer Overflows in C
Abstract
This is the first in a series of activities designed to teach students about stack smashing attacks and defenses. This specific activity teaches students about the concept of buffer overflows and how there is a potential for their occurence in C programs that accept command-line parameters and use unsafe functions such as strcpy().
Level: Undergraduate
Setting: Classroom
Type: Learning Cycle
Discipline: Computer Science
Course: Cybersecurity
Keywords: buffer overflow, memory, string copy, unsafe functions

Downloads
Published
2024-12-03
How to Cite
Ramaprasad, H., Sridhar, M., & Snyder, Y. (2024). Activity 1 - Buffer Overflows in C. POGIL Activity Clearinghouse, 5(1). Retrieved from https://pac.pogil.org/index.php/pac/article/view/416
Issue
Section
Activities for Review
License
Copyright (c) 2024 Harini Ramaprasad, Meera Sridhar, Yates SnyderCopyright of this work and the permissions granted to users of the PAC are defined in the PAC Activity User License.