Back to Results
First PageMeta Content
Software bugs / Buffer overflow / Memory safety / Heap overflow / Vulnerability / Uncontrolled format string / Pointer / Return-to-libc attack / Dangling pointer / Computing / Cyberwarfare / Computer security


Runtime countermeasures for code injection attacks against C and C++ programs YVES YOUNAN, WOUTER JOOSEN and FRANK PIESSENS Katholieke Universiteit Leuven The lack of memory-safety in C/C++ often leads to vulnerabilitie
Add to Reading List

Document Date: 2013-02-27 15:05:36


Open Document

File Size: 281,87 KB

Share Result on Facebook

City

Vulnerability Stack / /

Company

Microsoft / Intel Corporation / /

IndustryTerm

networked computing / software vulnerabilities / commodity operating systems / software engineers / /

OperatingSystem

Linux / /

Organization

Katholieke Universiteit Leuven / /

Person

Yves Younan / /

Position

Protection Mechanisms General / virtual memory manager / General / designer / memory manager / programmer / /

ProgrammingLanguage

C / C++ / L / /

Technology

virtual memory / Linux system / operating systems / Linux / /

SocialTag