A Fuzzy Logic-Based Buffer Overflow Vulnerability Auditor

Buffer overflow (BOF) vulnerabilities in programs might result in unwanted consequences such as neighboring data corruption and execution of arbitrary code. To assure that implemented programs are free from BOF, auditing is a well known quality assurance method. Today, there exist few tools that aid...

Full description

Saved in:
Bibliographic Details
Published in:2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing pp. 137 - 144
Main Authors: Shahriar, H., Zulkernine, M.
Format: Conference Proceeding
Language:English
Published: IEEE 01.12.2011
Subjects:
ISBN:9781467300063, 1467300063
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first