Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks

Malicious intrusions by buffer overflow attacks cause serious security problems and pose serious threats for networks and distributed systems such as clusters, Grids and P2P systems. Array & pointer boundary checking is one of the most effective approaches for defending against buffer overflow a...

Full description

Saved in:
Bibliographic Details
Published in:Journal of parallel and distributed computing Vol. 66; no. 9; pp. 1129 - 1136
Main Authors: Shao, Zili, Cao, Jiannong, Chan, Keith C.C., Xue, Chun, Sha, Edwin H.-M.
Format: Journal Article
Language:English
Published: Elsevier Inc 01.09.2006
Subjects:
ISSN:0743-7315, 1096-0848
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first