J Xu,
P Ning, C Kil, Y Zhai, C Bookholt - … of the 12th ACM conference on …, 2005 - dl.acm.org
Cyber attacks against networked computers have become relentless in recent years. The
most common attack method is to exploit memory corruption vulnerabilities such as buffer …