Access your Pro+ Content below.
Memory corruption attacks
Sponsored by ComputerWeekly.com
Lack of diversity in software and operating systems over many years has left a large number of computers vulnerable to memory program attacks. A diversified and replicated execution system promises to provide effective countermeasures.
Table Of Contents
- Programming language and library issues
- Operating system issues
- A proof of concept developed for certain countermeasures against memory corruption
Access this CW+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.