Buffer Overflow Vulnerabilities in the Age of AI: Challenges and Mitigation Strategies

Article Sidebar

Main Article Content

Mr. Hritik Sharma
(Dr.) Seema Gupta

Abstract: Buffer overflow vulnerabilities have plagued software systems for decades and continue to pose a significant security risk. My paper provides a comprehensive analysis of buffer overflows, detailing their mechanisms, historical context, and the challenges they present to modern systems. It explores traditional and contemporary defense strategies, including compile-time and run-time defenses, and examines the potential role of emerging technologies like Artificial Intelligence (AI) in mitigating these vulnerabilities. The paper emphasizes the ongoing need for robust security practices and continuous research to address this enduring threat.

Buffer Overflow Vulnerabilities in the Age of AI: Challenges and Mitigation Strategies. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(9), 113-117. https://doi.org/10.51583/IJLTEMAS.2025.1409000015

Downloads

References

Black, Paul E., and Irena Bojanova. "Defeating buffer overflow: A trivial but dangerous bug." IT professional 18, no. 6 (2016): 58-61.

Maroš, B., Homoliak, I., Kacic, M. and Petr, H., 2013, October. Detection of network buffer overflow attacks: A case study. In 2013 47th International Carnahan Conference on Security Technology (ICCST) (pp. 1-4). IEEE.

Piromsopa, Krerk, and Richard J. Enbody. "Buffer-overflow protection: the theory." 2006 IEEE International Conference on Electro/Information Technology. IEEE, 2006.

Day, David Jonathan. Mitigating the Risk of Buffer Overflow Attacks Against Forked Daemon Servers Using Network Intrusion Detection Systems. University of Derby (United Kingdom), 2010.

Alam, Shahid. "Cybersecurity: Past, present and future." arXiv preprint arXiv:2207.01227 (2022).

Gu A, Jain N, Li WD, Shetty M, Shao Y, Li Z, Yang D, Ellis K, Sen K, Solar-Lezama Challenges and paths towards ai for software engineering. arXiv preprint arXiv:2503.22625. 2025 Mar 28.

Xu H, Wang S, Li N, Wang K, Zhao Y, Chen K, Yu T, Liu Y, Wang H. Large language models for cyber security: A systematic literature review. arXiv preprint arXiv:2405.04760. 2024 May 8.

Article Details

How to Cite

Buffer Overflow Vulnerabilities in the Age of AI: Challenges and Mitigation Strategies. (2025). International Journal of Latest Technology in Engineering Management & Applied Science, 14(9), 113-117. https://doi.org/10.51583/IJLTEMAS.2025.1409000015