Now showing items 1-1 of 1

    • Improvement of tagged architecture for preventing software vulnerabilities 

      Shah, Tejaskumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...