When stack protection does not protect the stack?

The majority of software vulnerabilities originate from buffer overflow. Techniques to eliminate buffer overflows and limit their damage include secure programming, source code audit, binary code audit, static and dynamic code generation features. Modern compilers implement compile-time and executio...

Full description

Bibliographic Details
Main Authors: Pavel Dovgalyuk, Vladimir Makarov
Format: Article
Language:English
Published: Ivannikov Institute for System Programming of the Russian Academy of Sciences 2018-10-01
Series:Труды Института системного программирования РАН
Subjects:
gcc
Online Access:https://ispranproceedings.elpub.ru/jour/article/view/169