|
Volumn , Issue , 2005, Pages 378-387
|
Defeating memory corruption attacks via pointer taintedness detection
|
Author keywords
Attack; Hardware Design; Security; Taintedness; Vulnerability
|
Indexed keywords
MEMORY CORRUPTION ATTACKS;
NON-CONTROL DATA ATTACKS;
PROGRAM CONTROL DATA;
PROGRAM EXECUTION;
COMPUTER NETWORKS;
COMPUTER PROGRAMMING;
CRYPTOGRAPHY;
STORAGE ALLOCATION (COMPUTER);
SECURITY OF DATA;
|
EID: 27544498541
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (127)
|
References (24)
|