A First Step towards Automated Detection of Buffer Overrun Vulnerabilities (2000)
Cached
Download Links
- [www.cs.umd.edu]
- [www.cs.umd.edu]
- [www.isoc.org]
- [www.eecs.umich.edu]
- [www.bennetyee.org]
- [www.bennetyee.org]
- [www.bennetyee.org]
- [www.bennetyee.org]
- [www.simovits.com]
- [www.cs.cornell.edu]
- [www.cs.berkeley.edu]
- [HTTP.CS.Berkeley.EDU]
- [www.cs.umd.edu]
- [www.scs.stanford.edu]
- [now.cs.berkeley.edu]
- [www.cs.berkeley.edu]
- [http.cs.berkeley.edu]
- [www.eecs.berkeley.edu]
- [www.gnucash.org]
- [www.cs.stonybrook.edu]
- [alum.cs.sunysb.edu]
- [www.cs.sunysb.edu]
- [www.dmi.unipg.it]
- [www.cs.berkeley.edu]
- [http.cs.berkeley.edu]
- [www.eecs.berkeley.edu]
- [www.gnucash.org]
- [theory.stanford.edu]
- [theory.stanford.edu]
- DBLP
Other Repositories/Bibliography
by
David Wagner
,
Jeffrey S. Foster
,
Eric A. Brewer
,
Alexander Aiken
Venue: | IN NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM |
Citations: | 385 - 9 self |