Defending against Buffer-Overflow Vulnerabilities

A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a vulnerability that represents a severe security threat.

Saved in:
Bibliographic Details
Published in:Computer (Long Beach, Calif.) Vol. 44; no. 11; pp. 53 - 60
Main Authors: Padmanabhuni, B., Hee Beng Kuan Tan
Format: Journal Article
Language:English
Published: New York, NY IEEE 01.11.2011
IEEE Computer Society
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:0018-9162, 1558-0814
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a vulnerability that represents a severe security threat.
Bibliography:SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 14
ObjectType-Article-1
ObjectType-Feature-2
content type line 23
ISSN:0018-9162
1558-0814
DOI:10.1109/MC.2011.229