Hi all,
This is one of my favorite interviews about software security and
Exploiting Software that has been done to date.
http://www.informit.com/articles/article.asp?p=174303
gem
[Ed. Apologies for the duplicate/headerless posting, as I am trying
to work out the moderating from a PDA while
The company was once called araksha. Their technology is good (think compiler
optimization foo) but not a silver bullet. Many of the problems and issues with this
approach can be found in a paper published a couple of years ago at usenix security.
Google for it through the MIT profs name.