Computer Science ›› 2008, Vol. 35 ›› Issue (1): 87-89.

Previous Articles     Next Articles

LI Yi-Chao LIU Dan HAN Hong LU Xian-Liang (School of Computer Science & Engineering, UEST of China, Chengdu 610054)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: The buffer overflow vulnerability in software results in serious security problem, and attacks based on buffer overflow have brought huge society chaos and economic loss. Many researchers focus on the detection and defense of buffer overflow. In this pape

Key words: Buffer overflow, Static analysis, Dynamic analysis, Bound checking

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!