Control-flow hijacking attacks are used to perform malicious com-putatio...
Protecting programs against control-flow hijacking attacks recently has
...
Integer overflows have threatened software applications for decades. Thu...
Integer overflows in commodity software are a main source for software b...