Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Book Section
%1 bellettini2009memory
%A Bellettini, Carlo
%A Rrushi, Julian L.
%B Handbook of Research on Information Security and Assurance
%C Hershey, PA, USA
%D 2009
%E Gupta, Jatinder N. D.
%E Sharma, Sushil
%I IGI Global
%K security
%P 139--151
%R 10.4018/978-1-59904-855-0.ch012
%T Memory corruption attacks, defenses, and evasions
%U http://dx.doi.org/10.4018/978-1-59904-855-0.ch012
@incollection{bellettini2009memory,
added-at = {2014-10-11T19:31:28.000+0200},
address = {Hershey, PA, USA},
author = {Bellettini, Carlo and Rrushi, Julian L.},
biburl = {https://www.bibsonomy.org/bibtex/23aa78929b4f90957bd6a6f3cf36e1283/carlobellettini},
booktitle = {Handbook of Research on Information Security and Assurance},
doi = {10.4018/978-1-59904-855-0.ch012},
editor = {Gupta, Jatinder N. D. and Sharma, Sushil},
interhash = {2bde6146477bcc66c38d19db4392dc0e},
intrahash = {3aa78929b4f90957bd6a6f3cf36e1283},
keywords = {security},
pages = {139--151},
publisher = {IGI Global},
refid = {479},
timestamp = {2014-10-15T18:42:32.000+0200},
title = {Memory corruption attacks, defenses, and evasions},
url = {http://dx.doi.org/10.4018/978-1-59904-855-0.ch012},
year = 2009
}