Author:
Hafkemeyer Linus,Starink Jerre,Continella Andrea
Publisher
Springer Nature Switzerland
Reference41 articles.
1. Anderson, J.P.: Computer security technology planning study. Tech. rep., U.S. Air Force Electronic Systems Division (1972)
2. Assaiante, C., D’Elia, D.C., Di Luna, G.A., Querzoni, L.: Where did my variable go? Poking Holes in incomplete debug information. In: Proceedings of the ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2023)
3. Avgerinos, T., Cha, S.K., Hao, B.L.T., Brumley, D.: AEG: automatic exploit generation. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2011)
4. Böhme, M.: oss-security - Invalid writes and reads in libxml2 (2017)
5. Cha, S.K., Avgerinos, T., Rebert, A., Brumley, D.: Unleashing Mayhem on Binary Code. In: Proceedings of the IEEE Symposium on Security and Privacy (S &P) (2012)