共 40 条
[2]
Bevier, 1987, 11 COMP LOG INC
[4]
Static Detection of Packet Injection Vulnerabilities - A Case for Identifying Attacker-controlled Implicit Information Leaks
[J].
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2015,
:388-400
[5]
Cohen E, 2009, LECT NOTES COMPUT SC, V5674, P23, DOI 10.1007/978-3-642-03359-9_2
[6]
VCC: Contract-based Modular Verification of Concurrent C
[J].
2009 31ST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, COMPANION VOLUME,
2009,
:429-+
[7]
From L3 to seL4 What Have We Learnt in 20 Years of L4 Microkernels?
[J].
SOSP'13: PROCEEDINGS OF THE TWENTY-FOURTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES,
2013,
:133-150
[9]
GNU, COYOT WEBS