A methodology for finding source-level vulnerabilities of the Linux kernel variables

Jaekwang Kim, Jee-Hyong Lee. A methodology for finding source-level vulnerabilities of the Linux kernel variables. In Proceedings of the International Joint Conference on Neural Networks, IJCNN 2008, part of the IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, June 1-6, 2008. pages 3717-3722, IEEE, 2008. [doi]

@inproceedings{KimL08:3,
  title = {A methodology for finding source-level vulnerabilities of the Linux kernel variables},
  author = {Jaekwang Kim and Jee-Hyong Lee},
  year = {2008},
  doi = {10.1109/IJCNN.2008.4634331},
  url = {http://dx.doi.org/10.1109/IJCNN.2008.4634331},
  tags = {source-to-source, peer-to-peer, open-source},
  researchr = {https://researchr.org/publication/KimL08%3A3},
  cites = {0},
  citedby = {0},
  pages = {3717-3722},
  booktitle = {Proceedings of the International Joint Conference on Neural Networks, IJCNN 2008, part of the IEEE World Congress on Computational Intelligence, WCCI 2008, Hong Kong, China, June 1-6, 2008},
  publisher = {IEEE},
}