A review of security issues and solutions for precision health in Internet-of-Medical-Things systems

N Li, M Xu, Q Li, J Liu, S Bao, Y Li, J Li… - Security and …, 2023 - sands.edpsciences.org
Precision medicine provides a holistic perspective of an individual's health, including
genetic, environmental, and lifestyle aspects to realize individualized therapy. The …

An empirical comparison of commercial and open‐source web vulnerability scanners

R Amankwah, J Chen, PK Kudjo… - Software: Practice and …, 2020 - Wiley Online Library
Web vulnerability scanners (WVSs) are tools that can detect security vulnerabilities in web
services. Although both commercial and open‐source WVSs exist, their vulnerability …

Effective memory diversification in legacy systems

D Jang, H Yun - International journal of electrical and computer …, 2023 - hrcak.srce.hr
Sažetak Memory corruption error is one of the critical security attack vectors against a wide
range of software. Addressing this problem, modern compilers provide multiple features to …

[PDF][PDF] Randomizing Malloc: Stomp the Code Monkeys

J Ervin, T Lynn, A Prabhu, N Yerramilli, M Bishop - aakprabhu.com
Buffer overflows are still common vulnerabilities. Several techniques deal with stack-based
overflows, but less has been done with heap-based overflows. This work examines the …