Browsing by Subject "|Computer security"
Now showing items 1-1 of 1
-
Improvement of tagged architecture for preventing software vulnerabilities
(Dhirubhai Ambani Institute of Information and Communication Technology, 2008)In spite of the many defense techniques, software vulnerabilities like buffer overflow, format string vulnerability and integer vulnerability is still exploited by attackers. These software vulnerabilities arise due to ...