Login / Signup

Detecting overflow vulnerabilities using automated verification.

Brian A. MalloyMurali SitaramanJason O. Hallstrom
Published in: CSIIRW (2009)
Keyphrases