Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • SEARCH
  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 1115385
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 17, 20262026-05-17T03:08:52+00:00 2026-05-17T03:08:52+00:00

what are the ideas of preventing buffer overflow attacks? and i heard about Stackguard,but

  • 0

what are the ideas of preventing buffer overflow attacks? and i heard about Stackguard,but until now is this problem completely solved by applying stackguard or combination of it with other techniques?

after warm up, as an experienced programmer

Why do you think that it is so
difficult to provide adequate
defenses for buffer overflow attacks?

Edit: thanks for all answers and keeping security tag active:)

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-17T03:08:53+00:00Added an answer on May 17, 2026 at 3:08 am

    There’s a bunch of things you can do. In no particular order…

    First, if your language choices are equally split (or close to equally split) between one that allows direct memory access and one that doesn’t , choose the one that doesn’t. That is, use Perl, Python, Lisp, Java, etc over C/C++. This isn’t always an option, but it does help prevent you from shooting yourself in the foot.

    Second, in languages where you have direct memory access, if classes are available that handle the memory for you, like std::string, use them. Prefer well exercised classes to classes that have fewer users. More use means that simpler problems are more likely to have been discovered in regular usage.

    Third, use compiler options like ASLR and DEP. Use any security related compiler options that your application offers. This won’t prevent buffer overflows, but will help mitigate the impact of any overflows.

    Fourth, use static code analysis tools like Fortify, Qualys, or Veracode’s service to discover overflows that you didn’t mean to code. Then fix the stuff that’s discovered.

    Fifth, learn how overflows work, and how to spot them in code. All your coworkers should learn this, too. Create an organization-wide policy that requires people be trained in how overruns (and other vulns) work.

    Sixth, do secure code reviews separately from regular code reviews. Regular code reviews make sure code works, that it passes functional tests, and that it meets coding policy (indentation, naming conventions, etc). Secure code reviews are specifically, explicitly, and only intended to look for security issues. Do secure code reviews on all code that you can. If you have to prioritize, start with mission critical stuff, stuff where problems are likely (where trust boundaries are crossed (learn about data flow diagrams and threat models and create them), where interpreters are used, and especially where user input is passed/stored/retrieved, including data retrieved from your database).

    Seventh, if you have the money, hire a good consultant like Neohapsis, VSR, Matasano, etc. to review your product. They’ll find far more than overruns, and your product will be all the better for it.

    Eighth, make sure your QA team knows how overruns work and how to test for them. QA should have test cases specifically designed to find overruns in all inputs.

    Ninth, do fuzzing. Fuzzing finds an amazingly large number of overflows in many products.

    Edited to add: I misread the question. THe title says, “what are the techniques” but the text says “why is it hard”.

    It’s hard because it’s so easy to make a mistake. Little mistakes, like off-by-one errors or numeric conversions, can lead to overflows. Programs are complex beassts, with complex interactions. Where there’s complexity there’s problems.

    Or, to turn the question back on you: why is it so hard to write bug-free code?

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Related Questions

This question isn't about preventing a single user from registering multiple accounts. It is
Any ideas on how to disable, but not uninstall Resharper 4.x or above?
Any ideas why this won't validate here: http://validator.w3.org/#validate_by_input It seems the form input tags
Both ideas sound very similar to me, but there might be subtle differences or
I have recently run into a problem. My iPad app is somehow preventing the
I get this error in debugger and its preventing a debugging. unable to load
Ok this might seems a bad idea or an obvious one. But let's imagine
Any ideas on how i can create this app? 1) i have a page
Possible Duplicate: Cannot use ‘this’ in member initializer? Any ideas why I get an
This is an off the wall question but I have always gotten great support

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.