Login / Signup
Automated exploit generation for stack buffer overflow vulnerabilities.
Vartan A. Padaryan
V. V. Kaushan
A. N. Fedotov
Published in:
Program. Comput. Softw. (2015)
Keyphrases
</>
buffer overflow
security problems
data corruption
rare events
computer networks
information security
security requirements
security mechanisms