Login / Signup
Defeating Memory Corruption Attacks via Pointer Taintedness Detection.
Shuo Chen
Jun Xu
Nithin Nakka
Zbigniew Kalbarczyk
Ravishankar K. Iyer
Published in:
DSN (2005)
Keyphrases
</>
data corruption
detection method
anomaly detection
attack detection
detection accuracy
data structure
false alarms
detection algorithm
automatic detection
memory requirements
detection rate
malicious attacks
main memory
countermeasures
memory usage
security threats
data mining
normal traffic