Skip to main content

Buffer overflows are among the most common security vulnerabilities in current IT systems. An attempt is made to describe how they occur, how to suppress the direct consequences and what measures can be taken to protect the overall system. This is the written summary of this lecture.

Authors
Alexander Schinner
Published
27.07.2011
Reprint
x