Convicting exploitable software vulnerabilities: An efficient input provenance based approach

Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu. Convicting exploitable software vulnerabilities: An efficient input provenance based approach. In The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings. pages 247-256, IEEE Computer Society, 2008. [doi]

@inproceedings{LinZX08,
  title = {Convicting exploitable software vulnerabilities: An efficient input provenance based approach},
  author = {Zhiqiang Lin and Xiangyu Zhang and Dongyan Xu},
  year = {2008},
  doi = {10.1109/DSN.2008.4630093},
  url = {http://dx.doi.org/10.1109/DSN.2008.4630093},
  tags = {rule-based, systematic-approach},
  researchr = {https://researchr.org/publication/LinZX08},
  cites = {0},
  citedby = {0},
  pages = {247-256},
  booktitle = {The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings},
  publisher = {IEEE Computer Society},
}