Login / Signup
Detecting concurrency vulnerabilities based on partial orders of memory and thread events.
Kunpeng Yu
Chenxu Wang
Yan Cai
Xiapu Luo
Zijiang Yang
Published in:
ESEC/SIGSOFT FSE (2021)
Keyphrases
</>
partial order
partially ordered
total order
partial ordering
stable marriage
lattice structure
event detection
preference relations
dominance relation
database systems
memory requirements
concurrency control
information security
incoming data
totally ordered
vertex cover
attack graph
sequential patterns