Login / Signup

Exploiting stack-based buffer overflow using modern day techniques.

Stefan NiculaRazvan Daniel Zota
Published in: EUSPN/ICTH (2019)
Keyphrases
  • buffer overflow
  • data corruption
  • security problems
  • wireless sensor networks