Login / Signup

Exploring security vulnerabilities by exploiting buffer overflow using the MIPS ISA.

Andrew T. PhillipsJack S. Eddy Tan
Published in: SIGCSE (2003)
Keyphrases
  • security vulnerabilities
  • buffer overflow
  • intrusion detection
  • dos attacks
  • security properties
  • data corruption
  • unauthorized access
  • security problems
  • rare events
  • database
  • databases
  • web services
  • access control