Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer Taintedness Semantics

sec2004-taintedness-chen.pdf
PDF file

In  Proceedings of IFIP International Information Security Conference

Details

TypeProceedings
> Publications > Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer Taintedness Semantics