• Cellular baseband security 

      Davis, Andrew (Georgia Institute of Technology, 2012-05-07)
      Memory corruption vulnerabilities have been exploited by attackers to com- promise systems for years. Traditional computing systems have had years of defenses developed for them such as ASLR and DEP. However, these ...