Cited By
View all- Schaumont P(2017)Security in the internet of thingsProceedings of the Conference on Design, Automation & Test in Europe10.5555/3130379.3130543(674-679)Online publication date: 27-Mar-2017
Stack canaries are a well-known and effective technique for detecting and defeating stack overflow attacks. However, they are not perfect. For programs compiled using gcc, the reference canary value is randomly generated at program invocation and fixed ...
Many security attacks are caused by software vulnerabilities such as buffer overflow. How to eliminate or mitigate these vulnerabilities, in particular with unstoppable software, is a great challenge for security researchers and practitioners. In this ...
EDA Consortium
San Jose, CA, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in