Code one C Manual do Utilizador Página 15

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 15
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 14
[18] U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. De-
tecting format string vulnerabilities with type qualifiers.
In Proceedings of the 10th USENIX Security Symposium,
2001.
[19] J. Shapiro, J. Smith, and D. Farber. EROS: a fast capability
system. In Proceedings of the 17th ACM Symposium on
Operating Systems Principles, 1999.
[20] J. Viega, J. T. Bloch, T. Kohno, and G. McGraw. Its4: A
static vulnerability scanner for c and c++ code. In Pro-
ceedings of the 16th Annual Computer Security Applica-
tions Conference, December 2000.
[21] D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step
towards automated detection of buffer overrun vulnerabil-
ities. In Proceedings of NDSS 2000, 2000.
[22] J. Yun, T. Kremenek, Y. Xie, and D. Engler. Meca: an
extensible, expressive system and language for statically
checking security properties. In V. Atluri and P. Liu,
editors, Proceedings of the 10th ACM Conference on
Computer and Communication Security, pages 321–334,
Washington, DC, October 2003. ACM.
[23] X. Zhang, A. Edwards, and T. Jaeger. Using CQUAL for
static analysis of authorization hook placement. In Pro-
ceedings of the Eleventh Usenix Security Symposium, Au-
gust 2002.
Vista de página 14
1 2 ... 10 11 12 13 14 15

Comentários a estes Manuais

Sem comentários