作者: Nurul Haszeli Ahmad , Syed Ahmad Aljunid , Jamalul-lail Ab Manan
DOI: 10.1007/978-3-642-22191-0_33
关键词:
摘要: Various software vulnerabilities classifications have been constructed since the early 70s for correct understanding of vulnerabilities, and thus acts as a strong foundation to protect prevent from exploitation. However, despite all research efforts, exploitable still exist in most major software, common being C overflows vulnerabilities. overflow are frequent appear various advisories with high impact or critical severity. Partially but significantly, this is due absence source code perspective taxonomy address types Therefore, we propose taxonomy, which also classifies latest into four new categories. We describe ways detect overcome these hence, valuable reference developers security analysts identify potential loopholes so reduce exploitations altogether.