Buffer Overflow Defenses. ©2002, Jedidiah R. Crandall, Susan L. Gerhart, Jan G. Hogle. http://sfsecurity.pr.erau.edu.
Find-and-patch methods
Examples: Software patches, anti-virus software
Pros:
Very effective at preventing known attacks, or even unknown attacks on known vulnerabilities
Usually does not require that the software be recompiled
Cons:
Not effective at preventing attacks on unknown vulnerabilities, or sometimes unknown attacks on known vulnerabilities