Login / Signup
Protecting Legacy Code against Control Hijacking via Execution Location Equivalence Checking.
Tobias F. Pfeffer
Stefan Sydow
Joachim Fellmuth
Paula Herber
Published in:
QRS (2016)
Keyphrases
</>
source code
code generation
databases
access control
adaptive control
static analysis
database
information systems
open source
control method
control theory
legacy software