Enhancing security using legality assertions

Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited to protecting the return address on the stack; others are more general, but have undesirable properties such as large over...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:12th Working Conference on Reverse Engineering (WCRE'05) S. 10 pp. - 44
Hauptverfasser: Lei Wang, Cordy, J.R., Dean, T.R.
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: IEEE 2005
Schlagworte:
ISBN:0769524745, 9780769524740
ISSN:1095-1350
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!