Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{102323,
author = {Shuchi B. Shah},
title = { Analysing Heartbleed vulnerability in OpenSSL},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {1},
number = {12},
pages = {1536-1541},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=102323},
abstract = {Abstract–A OpenSSL versions 1.0.1 through 1.0.1f—introduced beginning in March 2012—had a serious memory handling flaw in their implementation of the TLS Heartbeat Extension.
This extension helps maintain user Internet connections without the need for continuous data
transfers. Attackers could exploit the bug to access an application’s memory, including sensitive data and private encryption keys. The latter could let them launch man-in-the middle attacks and decode intercepted communications. This has been introduced as the worst vulnerability in the modern internet. Existence of this vulnerability for two years without being discovered illustrates that a lot of important open source Internet software is not funded, developed, or reviewed carefully enough and the testing tools are not advanced enough to detect it.},
keywords = {},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry