Research Article

Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation

Listing 5

A small section of C code using library function “strcpy.”
1:char buffer;
2:buffer = (char ) malloc (MAX_size);
3:strcpy (buffer, argv 1);// strcpy function call