Computer Science ›› 2009, Vol. 36 ›› Issue (1): 252-255.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Attacks exploiting vulnerabilities in software are becoming a great threat to the society. The most common attack method is to exploit memory corruption vulnerabilities such as buffer overflow and format string bugs. This paper presented a fault localizat

Key words: Memory corruption attack, Software security, Fault Localization

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!