Issue No. 11 - November (2011 vol. 44)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2011.229
Bindu Madhavi Padmanabhuni , Nanyang Technological University, Singapore
Hee Beng Kuan Tan , Nanyang Technological University, Singapore
A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a vulnerability that represents a severe security threat.
Computer security, Buffer overflow, Vulnerabilities
Bindu Madhavi Padmanabhuni, Hee Beng Kuan Tan, "Defending against Buffer-Overflow Vulnerabilities", Computer, vol. 44, no. , pp. 53-60, November 2011, doi:10.1109/MC.2011.229