( 30 Slides Presantation )
Professor Suggestion: You should describe the history of the exploit, show clearly how it works, provide a small runnable code example that illustrates the problem and show how the exploit can be fixed. As a second example of the exploit, you must also include code from a reasonably-sized working application that exhibits the problem and provide a patch to fix the exploit in that application."
Download Attachment ( Must Be Include four deliverables)
My Topic: Buffer overflows (heap-based only)