Author:
Dor Nurit,Rodeh Michael,Sagiv Mooly
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Toward Pointer-Analysis-Based Vulnerability Discovery in Human–Machine Pair Programming;International Journal of Software Engineering and Knowledge Engineering;2024-02-22
2. Detecting Security Vulnerabilities with Vulnerability Nets;2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C);2022-12
3. Automated Memory Corruption Detection through Analysis of Static Variables and Dynamic Memory Usage;Electronics;2021-09-01
4. Sound garbage collection for C using pointer provenance;Proceedings of the ACM on Programming Languages;2020-11-13
5. Joint forces for memory safety checking revisited;International Journal on Software Tools for Technology Transfer;2019-08-06