@carlobellettini

Memory corruption attacks, defenses, and evasions

, and . Handbook of Research on Information Security and Assurance, IGI Global, Hershey, PA, USA, (2009)
DOI: 10.4018/978-1-59904-855-0.ch012

Links and resources

Tags