Author:
Jain Vanita,Singh Bhanupratap,Swapnil
Reference36 articles.
1. Jonathan, P., Baker, B.: Beyond stack smashing: recent advances in exploiting buffer overruns. IEEE Secur Privacy 2(4), 20–27 (2004)
2. Saito, T., et al.: A survey of prevention/mitigation against memory corruption attacks. In: 2016 19th International Conference on Network-Based Information Systems (NBiS). IEEE (2016)
3. Drimak, E.G.: Stack mechanism for a data processor. U.S. Patent No. 3,889,243 (1975)
4. Denning, P.J.: Virtual memory. ACM Comput Surv (CSUR) 2(3), 153–189 (1970)
5. Gorman, M.: Understanding the Linux Virtual Memory Manager. Prentice Hall, Upper Saddle River (2004)