Software security is software reliability
暂无分享,去创建一个
Enlist hacker expertise, but stay with academic fault naming conventions, when defending against the risk of exploitation of vulnerabilities and intrusions.
[1] R. Merton,et al. Genesis and development of a scientific fact , 1979 .
[2] David H. Ackley,et al. Randomized instruction set emulation to disrupt binary code injection attacks , 2003, CCS '03.
[3] Carla E. Brodley,et al. Detection and prevention of stack buffer overflow attacks , 2005, CACM.
[4] Halvar Flake,et al. Structural Comparison of Executable Objects , 2004, DIMVA.