Enhancing security using legality assertions

Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited to protecting the return address on the stack; others are more general, but have undesirable properties such as large over...

Full description

Saved in:
Bibliographic Details
Published in:12th Working Conference on Reverse Engineering (WCRE'05) pp. 10 pp. - 44
Main Authors: Lei Wang, Cordy, J.R., Dean, T.R.
Format: Conference Proceeding
Language:English
Published: IEEE 2005
Subjects:
ISBN:0769524745, 9780769524740
ISSN:1095-1350
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first