Brent G. Roth

Learn More
—Computing systems continue to be plagued by ma­ licious corruption of instructions and data. Buffer overflows, in particular, are often employed to disrupt the control flow of vulnerable processes. Existing methods of protection against these attacks operate by detecting corruption after it has taken place or by ensuring that if corruption has taken place,(More)
  • 1