Abstract | ||
---|---|---|
A survey of techniques ranging from static analysis to hardware modification describes how various defensive approaches protect against buffer overflow, a vulnerability that represents a severe security threat. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/MC.2011.229 | IEEE Computer |
Keywords | DocType | Volume |
buffer storage,program diagnostics,security of data,buffer overflow protection,defensive approaches,hardware modification,security threat,static analysis,vulnerability,Buffer overflow,Computer security,Vulnerabilities | Journal | 44 |
Issue | ISSN | Citations |
11 | 0018-9162 | 3 |
PageRank | References | Authors |
0.51 | 12 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Bindu Padmanabhuni | 1 | 3 | 0.51 |
Hee Beng Kuan Tan | 2 | 489 | 45.05 |