Login / Signup
Exploring security vulnerabilities by exploiting buffer overflow using the MIPS ISA.
Andrew T. Phillips
Jack S. Eddy Tan
Published in:
SIGCSE (2003)
Keyphrases
</>
security vulnerabilities
buffer overflow
intrusion detection
dos attacks
security properties
data corruption
unauthorized access
security problems
rare events
database
databases
web services
access control