Enhancing security using legality assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited to protecting the return address on the stack; others are more general, but have undesirable properties such as large over...
Saved in:
| Published in: | 12th Working Conference on Reverse Engineering (WCRE'05) pp. 10 pp. - 44 |
|---|---|
| Main Authors: | , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
2005
|
| Subjects: | |
| ISBN: | 0769524745, 9780769524740 |
| ISSN: | 1095-1350 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!

