Login / Signup
Detecting overflow vulnerabilities using automated verification.
Brian A. Malloy
Murali Sitaraman
Jason O. Hallstrom
Published in:
CSIIRW (2009)
Keyphrases
</>
automated verification
model checking
buffer overflow
automated reasoning
formal verification
database
information security
countermeasures
security risks
neural network
search space
evolutionary algorithm
automatic detection
theorem prover