MIT 6. 858 Computer Systems Security, Fall 2014 View the complete course: Instructor: James Mickens In this lecture, Professor Mickens continues the topic of buffer overflows, discussing approaches to such control hijacking attacks. License: Creative Commons BYNCSA More information at More courses at