Computer Science ›› 2006, Vol. 33 ›› Issue (6): 143-147.
Previous Articles Next Articles
Online:
Published:
Abstract: Buffer overflow attack is the most common and the most dangerous attack method used in network attacks. Various solutions have been developed to address the buffer overflow vulnerability problem in both research and commercial communities. First, detectio
Key words: Buffer overflow, Vulnerability, Buffer overflow vulnerability, Detection, Prevention
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I6/143
Cited