Login / Signup

A SPIN-based approach for detecting vulnerabilities in C programs.

Natalia KushikAmel MammarAna R. CavalliNina YevtushenkoWilly JimenezEdgardo Montes de Oca
Published in: Autom. Control. Comput. Sci. (2012)
Keyphrases
  • computer programs
  • real time
  • automatic detection
  • security vulnerabilities
  • information systems
  • relational databases
  • computer systems
  • information security
  • countermeasures