Krerk Piromsopa, Ph.D.
Affiliations: | 2006 | Michigan State University, East Lansing, MI |
Area:
Computer ScienceGoogle:
"Krerk Piromsopa"Parents
Sign in to add mentorRichard Enbody | grad student | 2006 | Michigan State | |
(Secure Bit: Buffer -overflow protection.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Dhumbumroong S, Piromsopa K. (2020) BoundWarden: Thread-enforced spatial memory safety through compile-time transformations Science of Computer Programming. 198: 102519 |
Choochotkaew S, Piromsopa K. (2014) An analysis of authentication models for MANETs Proceedings - 2014 International Conference On Information Science, Electronics and Electrical Engineering, Iseee 2014. 3: 1956-1960 |
Choochotkaew S, Piromsopa K. (2014) Development of a trustworthy authentication system in mobile ad-hoc networks for disaster area 2014 11th International Conference On Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology, Ecti-Con 2014 |
Piromsopa K, Enbody RJ. (2011) Survey of protections from buffer-overflow attacks Engineering Journal. 15: 31-52 |
Chiamwongpaet S, Piromsopa K. (2009) The implementation of secure canary word for buffer-overflow protection Proceedings of 2009 Ieee International Conference On Electro/Information Technology, Eit 2009. 56-61 |
Piromsopa K, Chiamwongpaet S. (2008) Secure Bit enhanced Canary: Hardware enhanced buffer-overflow protection Proceedings - 2008 Ifip International Conference On Network and Parallel Computing, Npc 2008. 125-131 |
Piromsopa K, Enbody RJ. (2007) Architecting security: A secure implementation of hardware buffer-overflow protection Proceedings of the 3rd Iasted International Conference On Advances in Computer Science and Technology, Acst 2007. 17-22 |
Piromsopa K, Enbody RJ. (2006) Secure bit: Transparent, hardware buffer-overflow protection Ieee Transactions On Dependable and Secure Computing. 3: 365-376 |
Piromsopa K, Enbody RJ. (2006) Arbitrary copy: Bypassing buffer-overflow protections 2006 Ieee International Conference On Electro Information Technology. 580-584 |
Piromsopa K, Enbody RJ. (2006) Buffer-overflow protection: The theory 2006 Ieee International Conference On Electro Information Technology. 454-458 |