|
Volumn , Issue , 2001, Pages 1-11
|
A case study in detecting software security vulnerabilities using constraint optimization
a
Cigital
(United States)
|
Author keywords
[No Author keywords available]
|
Indexed keywords
BUFFER STORAGE;
C (PROGRAMMING LANGUAGE);
CONSTRAINED OPTIMIZATION;
JAVA PROGRAMMING LANGUAGE;
ANALYSIS TECHNIQUES;
BUFFER OVERFLOWS;
C PROGRAMS;
CONSTRAINT OPTIMIZATIONS;
PROCESS FLOWS;
SOFTWARE SECURITY;
STATIC METHOD;
STATIC ANALYSIS;
|
EID: 84963808166
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/SCAM.2001.972661 Document Type: Conference Paper |
Times cited : (12)
|
References (9)
|