Research a specific buffer overflow attack technique of your choice. This should be a technique that has been actively exploited in the past 5 years or is still a current threat. Prepare a presentation on the attack that includes at least the following information:
- An explanation of the conditions that make systems vulnerable to this particular attack
- An explanation of how the attack works and how it is executed
- A graphical depiction (e.g., flowchart, diagram, video) of the attack in action and how it works
- Examples of how the attack has been exploited in the past (e.g., news stories, software security vulnerability alerts)
- Techniques for shielding against the attack or mitigating its effects
Support your presentation with at least 3 scholarly resources. Industry literature should also be used as appropriate.
Length: 8-10 slides with speaker notes (100-250 words per slide in the notes section)