Value-Range Analysis of C Programs

Available
0
StarStarStarStarStar
0Reviews
Abu?erover?owoccurswheninputiswrittenintoamemorybu?erthatisnot large enough to hold the input. Bu?er over?ows may allow a malicious person to gain control over a computer system in that a crafted input can trick the defectiveprogramintoexecutingcodethatisencodedintheinputitself.They are recognised as one of the most widespread forms of security vulnerability, and many workarounds, including new pr...
Read more
product_type_E-book
pdf
Price
129.50 £
Abu?erover?owoccurswheninputiswrittenintoamemorybu?erthatisnot large enough to hold the input. Bu?er over?ows may allow a malicious person to gain control over a computer system in that a crafted input can trick the defectiveprogramintoexecutingcodethatisencodedintheinputitself.They are recognised as one of the most widespread forms of security vulnerability, and many workarounds, including new pr...
Read more
Follow the Author

Options

  • Formats: pdf
  • ISBN: 9781848000179
  • Publication Date: 10 Mar 2010
  • Publisher: Springer London
  • Product language: English
  • Drm Setting: DRM