The use of special prologues and epilogues around functions can easily detect attacks that rely on stack overflows. Here is how "stack smashing" is actually performed and how its occurrence is detected.
By Oliver Mueller
June 19, 2012
URL : http://www.drdobbs.com/security/anatomy-of-a-stack-smashing-attack-and-h/240001832
Copyright © 2012 UBM Techweb