Implicit Buffer Overflow Protection Using Memory Segregation

Computing systems continue to be plagued by malicious corruption of instructions and data. Buffer overflows, in particular, are often employed to disrupt the control flow of vulnerable processes. Existing methods of protection against these attacks operate by detecting corruption after it has taken...

Full description

Saved in:
Bibliographic Details
Published in2011 Sixth International Conference on Availability, Reliability and Security pp. 175 - 182
Main Authors Roth, B. G., Spafford, E. H.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.08.2011
Subjects
Online AccessGet full text

Cover

Loading…