共 29 条
[2]
Abadi Martin., 2003, Proceedings of the 10th Annual Network and Distributed System Security Symposium, P107
[3]
Preventing memory error exploits with WIT
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:263-+
[4]
Anderson J. M., 1997, Operating Systems Review, V31, P1, DOI 10.1145/269005.266637
[5]
Castro M, 2006, Usenix Association 7th Usenix Symposium on Operating Systems Design and Implementation, P147
[6]
Hyperproperties
[J].
CSF 2008: 21ST IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, PROCEEDINGS,
2008,
:51-65
[8]
Dhurjati D, 2006, ACM SIGPLAN NOTICES, V41, P144, DOI 10.1145/1133981.1133999
[10]
The Matter of Heartbleed
[J].
PROCEEDINGS OF THE 2014 ACM INTERNET MEASUREMENT CONFERENCE (IMC'14),
2014,
:475-488