Issue No. 11 - November (2011 vol. 44)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2011.229
Bindu Madhavi Padmanabhuni , Nanyang Technological University, Singapore
Hee Beng Kuan Tan , Nanyang Technological University, Singapore
A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a vulnerability that represents a severe security threat.
Computer security, Buffer overflow, Vulnerabilities
H. B. Tan and B. M. Padmanabhuni, "Defending against Buffer-Overflow Vulnerabilities," in Computer, vol. 44, no. , pp. 53-60, 2011.