Buffer overflow protection is a technique used to enhance the security of executable programs by detecting and preventing buffer overflows on stack-allocated variables. It involves modifying the organization of stack-allocated data to include a canary value, bounds checking, and tagging to ensure memory allocated for storing data cannot contain executable code. Several implementations exist for compilers such as GCC, LLVM, and Visual Studio.
University of Washington
Autumn 2021
This course covers a wide range of computer security topics, including software security, cryptography, web security, malware, and physical security. It encourages a "security mindset" while requiring a firm understanding of computer science fundamentals and command-line Unix development environment.
No concepts data
+ 18 more concepts