Techniques for Defending from Buffer Overflow Vulnerability Security Exploits
Recent reports reveal that majority of security violations are caused by weaknesses in code. Buffer overflow vulnerability is the most severe of security violations. Though wide range of solutions from static analysis techniques to hardware modifications were proposed to tackle the vulnerability the...
Saved in:
| Published in: | IEEE internet computing p. 1 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
IEEE
2019
|
| Subjects: | |
| ISSN: | 1089-7801, 1941-0131 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!