Defeating Memory Corruption Attacks via Pointer Taintedness Detection

DSN_05_Pointer_Taintedness.pdf
PDF file

In  Proceedings of IEEE International Conference on Dependable Systems and Networks

Publisher  IEEE Computer Society
Copyright © 2007 IEEE. Reprinted from IEEE Computer Society. This material is posted here with permission of the IEEE. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Details

TypeProceedings
> Publications > Defeating Memory Corruption Attacks via Pointer Taintedness Detection