Login / Signup

Protection against Buffer Overflow Attacks through Runtime Memory Layout Randomization.

K. Shiva KumarRaghu-Kisore Neelisetti
Published in: ICIT (2014)
Keyphrases
  • buffer overflow
  • data corruption
  • security problems
  • virtual memory
  • privacy preserving
  • data structure
  • data mining
  • active learning
  • social network analysis