Implicit Buffer Overflow Protection Using Memory Segregation
Computing systems continue to be plagued by malicious corruption of instructions and data. Buffer overflows, in particular, are often employed to disrupt the control flow of vulnerable processes. Existing methods of protection against these attacks operate by detecting corruption after it has taken...
Saved in:
Published in | 2011 Sixth International Conference on Availability, Reliability and Security pp. 175 - 182 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.08.2011
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Be the first to leave a comment!