Login / Signup
Simple and precise static analysis of untrusted Linux kernel extensions.
Elazar Gershuni
Nadav Amit
Arie Gurfinkel
Nina Narodytska
Jorge A. Navas
Noam Rinetzky
Leonid Ryzhyk
Mooly Sagiv
Published in:
PLDI (2019)
Keyphrases
</>
static analysis
linux kernel
source code
dynamic analysis
software systems
operating system
open source
third party
regular expressions
symbolic execution
database
data sets
database systems
java card
malicious code
clone detection