Home
World Journal of Advanced Research and Reviews
International Journal with High Impact Factor for fast publication of Research and Review articles

Main navigation

  • Home
    • Journal Information
    • Editorial Board Members
    • Reviewer Panel
    • Abstracting and Indexing
    • Journal Policies
    • Our CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Join Editorial Board
    • Join Reviewer Panel
  • Contact us
  • Downloads

eISSN: 2581-9615 || CODEN: WJARAI || Impact Factor 8.2 ||  CrossRef DOI

Research and review articles are invited for publication in March 2026 (Volume 29, Issue 3) Submit manuscript

Fundamentals of buffer overflow attacks and detection techniques

Breadcrumb

  • Home
  • Fundamentals of buffer overflow attacks and detection techniques

Bogdan Barchuk *

Independent researcher.

 

Research Article

World Journal of Advanced Research and Reviews, 2025, 26(02), 2895-2908

Article DOI: 10.30574/wjarr.2025.26.2.1967

DOI url: https://doi.org/10.30574/wjarr.2025.26.2.1967

Received on 31 January 2025; revised on 19 May 2025; accepted on 22 May 2025

Buffer overflows remain a major security risk to software. The article presents the fundamentals of finding buffer overflow weaknesses and methods of analyzing them. Manual and automated fuzzing approaches allow the discovery of possible instances of the stack overflow attack. Immunity Debugger aids in discovering crashes, scrutinizing register clusters, and precisely determining the point at which buffer overflows occur within the memory of a program. Other approaches for identifying and eliminating such “badbytes” are also addressed. The study addresses approaches for bypassing the security measures implemented in contemporary OSs such as ASLR and DEP. This paper provides scripts and case studies allowing security experts and researchers to effectively locate, characterize, and remove far more vulnerabilities related to buffer overflows in many software systems.

Buffer Overflow; Fuzzing Techniques; Exploit Development; Debugger Analysis; ASLR Bypass; Shellcode Injection

https://wjarr.com/sites/default/files/fulltext_pdf/WJARR-2025-1967.pdf

Preview Article PDF

Bogdan Barchuk. Fundamentals of buffer overflow attacks and detection techniques. World Journal of Advanced Research and Reviews, 2025, 26(2), 2895-2908. Article DOI: https://doi.org/10.30574/wjarr.2025.26.2.1967

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

Copyright © 2026 World Journal of Advanced Research and Reviews - All rights reserved

Developed & Designed by VS Infosolution