Author:
Emamdoost Navid,Wu Qiushi,Lu Kangjie,McCamant Stephen
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Learning to Detect Memory-related Vulnerabilities;ACM Transactions on Software Engineering and Methodology;2023-12-23
2. Mining Resource-Operation Knowledge to Support Resource Leak Detection;Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2023-11-30
3. SyzDirect: Directed Greybox Fuzzing for Linux Kernel;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
4. Understanding and Mitigating Twin Function Misuses in Operating System Kernel;IEEE Transactions on Computers;2023-08-01
5. AbsIntIO: Towards Showing the Absence of Integer Overflows in Binaries using Abstract Interpretation;Proceedings of the ACM Asia Conference on Computer and Communications Security;2023-07-10