“…The protection solutions in the table are as follows: Segmentation [25], Integer Analysis to Determine Buffer Overflow [39], STOBO [14], Type-Assisted Buffer Overflow Detection [19], C Range Error Detector (CRED) [32], Jump Pointer [36], Stack-Guard [7], MemGuard [7], PointGuard [6], Smash-Guard [6], Minezone RAD [37], Read-only RAD [37], Efficient Dynamic Taint Analysis Using Multicore Machines [3], HeapDefender [20], Secure Bit [27], and Secure Canary Word [29] [4]. For comparison, we also include our proposed solution, Boundary Bit, in this table.…”