Back to Results
First PageMeta Content
Cyberwarfare / Buffer overflow / Stack buffer overflow / PaX / Memory safety / Return-to-libc attack / Address space layout randomization / Stack / Zero-day attack / Software bugs / Computer security / Computing


Chapter 1 Chapter 1 Introduction Even though memory corruption vulnerabilities are inherent to C, this language is
Add to Reading List

Document Date: 2013-04-18 05:57:24


Open Document

File Size: 2,57 MB

Share Result on Facebook

Company

CNN / Siemens / /

Country

Iran / /

Event

Bankruptcy / /

IndustryTerm

low-level software vulnerabilities / detection systems / network intrusion detection systems / industrial software / dangerous software errors / Anti-virus software / process/network / level solutions / information flow tracking systems / binary software / legacy software / trivial greeting server / real-world systems / host solutions / implemented various solutions / Internet Information Services / proposed multiple solutions / uranium enrichment infrastructure / database products / /

OperatingSystem

UNIX / Windows 2000 / Microsoft Windows / Windows XP / Linux / /

Organization

MS Server Service / /

Person

Elias Levy / /

Position

programmer / /

ProgrammingLanguage

Python / Java / /

Technology

data encryption / Plug and Play / operating system / Java / Anti-virus software / Linux / UNIX / /

SocialTag