Author:
Fournaris Apostolos P.,Keramidas Georgios,Ispoglou Kyriakos,Voros Nikolaos
Publisher
Springer International Publishing
Reference25 articles.
1. Aleph One. Smashing the stack for fun and profit. Phrack Magazine. 7(49), (1996)
2. M. Conover, w00w00 on heap overflows, w00w00 Security Team, http://www.w00w00.org/articles.html (1999)
3. Scut's team TECO, Exploiting Format String Vulnerability, http://www.team-teso.net/articles/formatstring , (2001)
4. H. Shahriar, M. Zulkernine, Taxonomy and classification of automatic monitoring of program security vulnerability exploitations. J. Syst. Softw. 84(2), 250–269 (2011)
5. W. Hu et~al., Secure and practical defense against code-injection attacks using software dynamic translation, in Proceedings of the 2nd International Conference on Virtual Execution Environments, ACM, New York (2006)