Taxonomy of C overflow vulnerabilities attack

Various software vulnerabilities classifications have been constructed since the early 70s for correct understanding of vulnerabilities, and thus acts as a strong foundation to protect and prevent software from exploitation. However, despite all research efforts, exploitable vulnerabilities still ex...

全面介紹

書目詳細資料
發表在:Communications in Computer and Information Science
主要作者: Ahmad N.H.; Aljunid S.A.; Ab Manan J.-L.
格式: Conference paper
語言:English
出版: 2011
在線閱讀:https://www.scopus.com/inward/record.uri?eid=2-s2.0-79960358896&doi=10.1007%2f978-3-642-22191-0_33&partnerID=40&md5=1298564cc2374e8fc9d612bb3670a55b

相似書籍