Map
Index
Random
Help
th

Quote: Multics avoids buffer overflow -- PL/I strings have a fixed maximum length; data can not be executed; virtual addresses are segmented; stacks grew up instead of down

topics > all references > references i-l > QuoteRef: kargPA12_2002 , p. 202



Group:
memory management
Topic:
security leaks and weaknesses
Topic:
stacks
Topic:
strings

Quotation Skeleton

PL/I character strings may be either fixed length … in an argument descriptor or in another variable … The net result is that a PL/I programmer … [Multics runtime] could detect mismatches between calling and called … Multics used the hardware execute permission bits to … data, denying execute permission to data is a … Multics virtual addresses are segmented … an overflow off the end of a segment … stacks on the Multics processor grew in a … This meant that if you actually accomplished a …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Group: memory management   (11 topics, 346 quotes)
Topic: security leaks and weaknesses (56 items)
Topic: stacks (6 items)
Topic: strings (13 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.