TechTarget

CW+ Premium Content/E-Handbooks

Thank you for joining!
Access your Pro+ Content below.
July 2014

Memory corruption attacks

Sponsored by ComputerWeekly.com

Lack of diversity in software and operating systems over many years has left a large number of computers vulnerable to memory program attacks. A diversified and replicated execution system promises to provide effective countermeasures.

Table Of Contents

 

  • Programming language and library issues
  • Operating system issues
  • A proof of concept developed for certain countermeasures against memory corruption

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close