Issue No. 06 - November-December (2003 vol. 1)
Jeannette M. Wing , Carnegie Mellon University
<p>Today's attacks exploit code-level flaws such as buffer overruns and type-invalid input. Now we should turn to tomorrow's attacks, and think beyond buffer overruns, code levels, and the horizon. This article is a call to arms to the research community to look toward the future.</p>
buffer, security, secure, code, software engineering
J. M. Wing, "A Call to Action: Look Beyond the Horizon," in IEEE Security & Privacy, vol. 1, no. , pp. 62-67, 2003.