Login / Signup
Characteristics of buffer overflow attacks tunneled in HTTP traffic.
Ivan Homoliak
Daniel Ovsonka
Karel Koranda
Petr Hanácek
Published in:
ICCST (2014)
Keyphrases
</>
buffer overflow
data corruption
security problems
rare events
traffic patterns
network traffic
training data
privacy preserving
security mechanisms