Login / Signup

Automated exploit generation for stack buffer overflow vulnerabilities.

Vartan A. PadaryanV. V. KaushanA. N. Fedotov
Published in: Program. Comput. Softw. (2015)
Keyphrases
  • buffer overflow
  • security problems
  • data corruption
  • rare events
  • computer networks
  • information security
  • security requirements
  • security mechanisms