Defending against memory buffer overflow attacks is a daunting proposition for computer software developers.
Failing to carefully specify appropriate inputs opens the door for hackers to insert malicious code by overwhelming a system’s memory space with unanticipated inputs.
But how do you plan for every possible type of input a hacker could use? You turn to Vijay Ganesh.
Read the full story.