Somesh Jha. Retrofitting Legacy Code for Security. In Tayssir Touili, Byron Cook, Paul Jackson, editors, Computer Aided Verification, 22nd International Conference, CAV 2010, Edinburgh, UK, July 15-19, 2010. Proceedings. Volume 6174 of Lecture Notes in Computer Science, pages 19, Springer, 2010. [doi]
@inproceedings{Jha10-0, title = {Retrofitting Legacy Code for Security}, author = {Somesh Jha}, year = {2010}, doi = {10.1007/978-3-642-14295-6_2}, url = {http://dx.doi.org/10.1007/978-3-642-14295-6_2}, tags = {security}, researchr = {https://researchr.org/publication/Jha10-0}, cites = {0}, citedby = {0}, pages = {19}, booktitle = {Computer Aided Verification, 22nd International Conference, CAV 2010, Edinburgh, UK, July 15-19, 2010. Proceedings}, editor = {Tayssir Touili and Byron Cook and Paul Jackson}, volume = {6174}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-642-14294-9}, }