Defending against Buffer-Overflow Vulnerabilities

A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a vulnerability that represents a severe security threat.

Saved in:
Bibliographic Details
Published in:Computer (Long Beach, Calif.) Vol. 44; no. 11; pp. 53 - 60
Main Authors: Padmanabhuni, B., Hee Beng Kuan Tan
Format: Journal Article
Language:English
Published: New York, NY IEEE 01.11.2011
IEEE Computer Society
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects:
ISSN:0018-9162, 1558-0814
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first