Login / Signup

Protecting Legacy Code against Control Hijacking via Execution Location Equivalence Checking.

Tobias F. PfefferStefan SydowJoachim FellmuthPaula Herber
Published in: QRS (2016)
Keyphrases
  • source code
  • code generation
  • databases
  • access control
  • adaptive control
  • static analysis
  • database
  • information systems
  • open source
  • control method
  • control theory
  • legacy software