Author:
Cowan C.,Wagle F.,Calton Pu ,Beattie S.,Walpole J.
Cited by
48 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. PwnMaster: Automatic Buffer Overflow and Format String Vulnerability Detection and Exploitation;2024 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR);2024-05-16
2. Pythia: Compiler-Guided Defense Against Non-Control Data Attacks;Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 3;2024-04-27
3. Detecting security vulnerabilities with vulnerability nets;Journal of Systems and Software;2024-02
4. Research on Buffer Overflow Vulnerability Mining Method Based on Deep Learning;2024 2nd International Conference on Big Data and Privacy Computing (BDPC);2024-01-10
5. Memory Simulations, Security and Optimization in a Verified Compiler;Proceedings of the 13th ACM SIGPLAN International Conference on Certified Programs and Proofs;2024-01-09