## Model Checking an Entire Linux Distribution for Security Violations (2005)

### Cached

### Download Links

- [www.acsac.org]
- [www.acsa-admin.org]
- [www.acsac.org]
- [www.cs.berkeley.edu]
- [www.cs.berkeley.edu]
- [now.cs.berkeley.edu]
- [http.cs.berkeley.edu]
- [www.cs.berkeley.edu]
- [www.eecs.berkeley.edu]
- [www.cs.berkeley.edu]
- [www.cs.ucdavis.edu]
- [http.cs.berkeley.edu]
- [www.cs.berkeley.edu]
- [now.cs.berkeley.edu]
- [www.eecs.berkeley.edu]
- [now.cs.berkeley.edu]
- [now.cs.berkeley.edu]
- [www.cs.berkeley.edu]
- [www.eecs.berkeley.edu]
- DBLP

### Other Repositories/Bibliography

by
Benjamin Schwarz
,
Hao Chen
,
David Wagner
,
Geoff Morrison
,
Jacob West
,
Jeremy Lin

Venue: | In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC |

Citations: | 26 - 3 self |