MIT Computer Systems Security, Fall 2014 View the complete course: Instructor: James Mickens In this lecture, Professor Mickens continues the topic of buffer overflows, discussing approaches to such control hijacking attacks. License: Creative Commons BY-NC-SA More information at More courses at
Hide player controls
Hide resume playing