Computer Science and Engineering
Introductory Cyber Security Lab
Experiments
Aim
Theory
Pretest
Procedure
Simulation
Posttest
References
Contributors
Feedback
Aim
Theory
Pretest
Procedure
Simulation
Posttest
References
Contributors
Feedback
Format String Vulnerabilities
Experiment to understand how format string vulnerabilities are caused and how they can be exploited