JMU
Corrupting Memory in C Programs
An Introduction


Prof. David Bernstein
James Madison University

Computer Science Department
bernstdh@jmu.edu


Motivation
Kinds of Corruptions
What Can Be Corrupted?
A String Overflow in the Data Segment
cexamples/bufferoverflow/unix/string_overflow_data.c