Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu. Convicting exploitable software vulnerabilities: An efficient input provenance based approach. In The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings. pages 247-256, IEEE Computer Society, 2008. [doi]
@inproceedings{LinZX08,
title = {Convicting exploitable software vulnerabilities: An efficient input provenance based approach},
author = {Zhiqiang Lin and Xiangyu Zhang and Dongyan Xu},
year = {2008},
doi = {10.1109/DSN.2008.4630093},
url = {http://dx.doi.org/10.1109/DSN.2008.4630093},
tags = {rule-based, systematic-approach},
researchr = {https://researchr.org/publication/LinZX08},
cites = {0},
citedby = {0},
pages = {247-256},
booktitle = {The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings},
publisher = {IEEE Computer Society},
}