Tools | Bookmark & Share | Make MrWhy My Homepage
MrWhy.com
Go
MrWhy.com » Videos » Programming: Secure Execution
Programming: Secure Execution
Programming: Secure Execution
Report
Programming: Secure Execution
The greatest threat to our modern information infrastructure is the remote exploitation of program vulnerabilities—31 out of 34 CERT advisories year-to-date are due to such exploitations. Saman Amarasinghe explains many ways in which malicious code, typically inserted into a computer system masquerading as data, can allow unauthorized access to a vulnerable privileged program. Buffer overflow, format string vulnerabilities and execution models for legitimate programs will be discussed. From the Series:CSE Colloquia - 2003
Channel: ResearchChannel
Category: Technology
Video Length: 3458
Date Found: February 12, 2009
Date Produced: January 28, 2003
View Count: 1
 
MrWhy.com Special Offers
1
2
3
4
5
 
About Us: About MrWhy.com | Advertise on MrWhy.com | Contact MrWhy.com | Privacy Policy | MrWhy.com Partners
Answers: Questions and Answers | Browse by Category
Comparison Shopping: Comparison Shopping | Browse by Category | Top Searches
Shop eBay: Shop eBay | Browse by Category
Shop Amazon: Shop Amazon | Browse by Category
Videos: Video Search | Browse by Category
Web Search: Web Search | Browse by Searches
Copyright © 2011 MrWhy.com. All rights reserved.