Fig. 2From: A buffer overflow detection and defense method based on RISC-V instruction set extensionPrinciple of Canary technology (Cowan et al. 1998)Back to article page