Issue No.11 - November (2011 vol.44)
Bindu Madhavi Padmanabhuni , Nanyang Technological University, Singapore
Hee Beng Kuan Tan , Nanyang Technological University, Singapore
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2011.229
A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a vulnerability that represents a severe security threat.
Computer security, Buffer overflow, Vulnerabilities
Bindu Madhavi Padmanabhuni, Hee Beng Kuan Tan, "Defending against Buffer-Overflow Vulnerabilities", Computer, vol.44, no. 11, pp. 53-60, November 2011, doi:10.1109/MC.2011.229