Taxonomy of C overflow vulnerabilities attack
Various software vulnerabilities classifications have been constructed since the early 70s for correct understanding of vulnerabilities, and thus acts as a strong foundation to protect and prevent software from exploitation. However, despite all research efforts, exploitable vulnerabilities still ex...
發表在: | Communications in Computer and Information Science |
---|---|
主要作者: | Ahmad N.H.; Aljunid S.A.; Ab Manan J.-L. |
格式: | Conference paper |
語言: | English |
出版: |
2011
|
在線閱讀: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960358896&doi=10.1007%2f978-3-642-22191-0_33&partnerID=40&md5=1298564cc2374e8fc9d612bb3670a55b |
相似書籍
-
Attack graph-based security metrics: concept, taxonomy, challenges and open issues
由: Al-Araji Z.J.; Ahmad S.S.S.; Farhood H.M.; Mutlag A.A.; Al-Khaldee M.S.
出版: (2024) -
Evaluation of Web Application Vulnerability Scanners using SQL Injection Attacks
由: Ibrahim R.Y.; Rosli M.M.
出版: (2023) -
A taxonomy of computation offloading in mobile cloud computing
由: Enzai N.I.M.; Tang M.
出版: (2014) -
Evaluation Approach for Efficient Countermeasure Techniques Against Denial-of-Service Attack on MPSoC-Based IoT Using Multi-Criteria Decision-Making
由: Al-Hchaimi A.A.J., et al.
出版: (2023) -
The Development of the Vulnerability Index (VI) using Principal Component Analysis (PCA)
由: Salleh S.A.; Isa N.A.; Siman N.A.; Zakaria N.H.; Pintor L.L.; Yaman R.; Dom N.C.
出版: (2023)