Computer Science ›› 2008, Vol. 35 ›› Issue (1): 87-89.
Previous Articles Next Articles
LI Yi-Chao LIU Dan HAN Hong LU Xian-Liang (School of Computer Science & Engineering, UEST of China, Chengdu 610054)
Online:
Published:
Abstract: The buffer overflow vulnerability in software results in serious security problem, and attacks based on buffer overflow have brought huge society chaos and economic loss. Many researchers focus on the detection and defense of buffer overflow. In this pape
Key words: Buffer overflow, Static analysis, Dynamic analysis, Bound checking
LI Yi-Chao LIU Dan HAN Hong LU Xian-Liang (School of Computer Science & Engineering, UEST of China, Chengdu 610054). [J].Computer Science, 2008, 35(1): 87-89.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I1/87
Cited