A ¯rst step towards automated detection of bu®er overrun vulnerabilities (2000)

by D Wagner, J Foster, E Brewer, A Aiken
Venue:In Symposium on Network and Distributed System Security