Enhancing security using legality assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited to protecting the return address on the stack; others are more general, but have undesirable properties such as large over...
Uložené v:
| Vydané v: | 12th Working Conference on Reverse Engineering (WCRE'05) s. 10 pp. - 44 |
|---|---|
| Hlavní autori: | , , |
| Médium: | Konferenčný príspevok.. |
| Jazyk: | English |
| Vydavateľské údaje: |
IEEE
2005
|
| Predmet: | |
| ISBN: | 0769524745, 9780769524740 |
| ISSN: | 1095-1350 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
Buďte prvý, kto okomentuje tento záznam!

