A Call to Action: Look Beyond the Horizon

  • Authors:
  • Jeannette M. Wing

  • Affiliations:
  • Carnegie Mellon University

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

Today's attacks exploit code-level flaws such as buffer overruns and type-invalid input. Now we should turn to tomorrow's attacks, and think beyond buffer overruns, code levels, and the horizon. This article is a call to arms to the research community to look toward the future.