Cybersecurity researcher takes aim at the ‘impossible’

Monday, January 9, 2017

Defending against memory buffer overflow attacks is a daunting proposition for computer software developers.

Failing to carefully specify appropriate inputs opens the door for hackers to insert malicious code by overwhelming a system’s memory space with unanticipated inputs.

But how do you plan for every possible type of input a hacker could use? You turn to Vijay Ganesh.

Read the full story.

  1. 2019 (40)
    1. July (3)
    2. June (5)
    3. May (4)
    4. April (4)
    5. March (12)
    6. February (2)
    7. January (10)
  2. 2018 (52)
    1. December (2)
    2. November (2)
    3. October (3)
    4. September (8)
    5. August (3)
    6. July (4)
    7. June (6)
    8. May (6)
    9. April (7)
    10. March (2)
    11. February (8)
    12. January (1)
  3. 2017 (55)
    1. December (1)
    2. November (3)
    3. October (7)
    4. September (9)
    5. August (9)
    6. July (3)
    7. June (2)
    8. May (3)
    9. April (3)
    10. March (9)
    11. February (1)
    12. January (5)
  4. 2016 (53)
  5. 2015 (39)
  6. 2014 (33)
  7. 2013 (12)
  8. 2012 (12)
  9. 2011 (3)