Login / Signup

Extended Protection against Stack Smashing Attacks without Performance Loss.

Yves YounanDavide PozzaFrank PiessensWouter Joosen
Published in: ACSAC (2006)
Keyphrases
  • data corruption
  • database
  • countermeasures
  • real time
  • security mechanisms
  • malicious attacks
  • learning algorithm
  • social networks
  • image watermarking
  • security threats
  • detect malicious