Taxonomy of C overflow vulnerabilities attack
Various software vulnerabilities classifications have been constructed since the early 70s for correct understanding of vulnerabilities, and thus acts as a strong foundation to protect and prevent software from exploitation. However, despite all research efforts, exploitable vulnerabilities still ex...
Published in: | Communications in Computer and Information Science |
---|---|
Main Author: | Ahmad N.H.; Aljunid S.A.; Ab Manan J.-L. |
Format: | Conference paper |
Language: | English |
Published: |
2011
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960358896&doi=10.1007%2f978-3-642-22191-0_33&partnerID=40&md5=1298564cc2374e8fc9d612bb3670a55b |
Similar Items
-
Attack graph-based security metrics: concept, taxonomy, challenges and open issues
by: Al-Araji Z.J.; Ahmad S.S.S.; Farhood H.M.; Mutlag A.A.; Al-Khaldee M.S.
Published: (2024) -
Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks
by: Ibrahim R.Y.; Rosli M.M.
Published: (2023) -
C programming: Relevant exercises for engineering students using bloom’s taxonomy
by: Abdul Rahman T.F.B.
Published: (2017) -
The Development of the Vulnerability Index (VI) using Principal Component Analysis (PCA)
by: Salleh S.A.; Isa N.A.; Siman N.A.; Zakaria N.H.; Pintor L.L.; Yaman R.; Dom N.C.
Published: (2023) -
A taxonomy of computation offloading in mobile cloud computing
by: Enzai N.I.M.; Tang M.
Published: (2014)