The Internet Archive has a preservation copy of this work in our general collections.
The file type is
We performed extensive experimental evaluation of our approach and show that it can detect all critical attacks such as buffer overflows, and format string attacks, including non-control data attacks. ... Memory corruption attacks remain the primary threat for computer security. Information flow tracking or taint analysis has been proven to be effective against most memory corruption attacks. ... Other approaches like FormatGuard  , FormatShield  , LibFormat  , Kimchi  , Lisbon  , White-Listing  defend against format string attacks. ...arXiv:0906.4481v2 fatcat:y2wyjl5pufa4bfds3isynqytdu