Incollection,

Memory corruption attacks, defenses, and evasions

, and .
Handbook of Research on Information Security and Assurance, IGI Global, Hershey, PA, USA, (2009)
DOI: 10.4018/978-1-59904-855-0.ch012

Meta data

Tags

Users

  • @carlobellettini

Comments and Reviews