DISSAV: A Dynamic, Interactive Stack- Smashing Attack Visualization Tool
Cover - CISSE Volume 9, Issue 1
PDF

Keywords

DISSAV
Dynamic
Interactive
Stack-Smashing
Attack
Visualization
Programing Visualization
Cybersecurity
Cybersecurity Education

How to Cite

DISSAV: A Dynamic, Interactive Stack- Smashing Attack Visualization Tool. (2022). Journal of The Colloquium for Information Systems Security Education, 9(1), 8. https://doi.org/10.53735/cisse.v9i1.141

Abstract

This paper describes DISSAV: Dynamic Interactive Stack Smashing Attack Visualization, a program visualization tool for teaching stack smashing attacks. DISSAV is a web-based application built with ReactJS. DISSAV provides a simulated attack scenario that guides the user through a three-part stack smashing attack. Our tool allows the user to create a program, construct a payload for it, and execute the program to simulate an attack scenario. We aim to improve student learning of advanced cyber security topics, more specifically, stack smashing attacks, by increasing student engagement and interaction. We incorporate previously researched techniques of Program Visualization tools such as dynamic user input and interactive views to achieve these goals.

PDF

Open Access License Notice:

This article is © its author(s) and is licensed under the Creative Commons Attribution 4.0 International License (CC BY 4.0). Beginning with Volume 13 (2026), this license is included directly within all published PDFs. For earlier articles, a cover page has been added to indicate the correct licensing terms. Any legacy copyright or pricing statements appearing within the PDF reflect prior print production workflows and do not represent the Journal’s current open access policy. For full details, please see the Journal’s License Terms.