Computer Science ›› 2009, Vol. 36 ›› Issue (1): 252-255.
Previous Articles Next Articles
Online:
Published:
Abstract: Attacks exploiting vulnerabilities in software are becoming a great threat to the society. The most common attack method is to exploit memory corruption vulnerabilities such as buffer overflow and format string bugs. This paper presented a fault localizat
Key words: Memory corruption attack, Software security, Fault Localization
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2009/V36/I1/252
Cited