• caglararli@hotmail.com
  • 05386281520

Software Defense: mitigating stack corruption vulnerabilties

Çağlar Arlı      -    16 Views

Software Defense: mitigating stack corruption vulnerabilties

Introduction One of the oldest forms of memory safety exploitation is that of stack corruption vulnerabilities, with several early high-profile exploits being of this type. It seems fitting therefore to kick off this Software Defense series by looking at the status of software defense today with respect to this age-old problem.