Detecting overflow vulnerabilities using automated verification

@inproceedings{Malloy2009DetectingOV,
  title={Detecting overflow vulnerabilities using automated verification},
  author={Brian A. Malloy and Murali Sitaraman and Jason O. Hallstrom},
  booktitle={CSIIRW},
  year={2009}
}
Maintaining the security of our computer systems has become one of the dominant aspects of the war on terror and many researchers and developers predict that the next attack against the United States will be a computer attack [5, 9, 11]. The Department of Homeland Security has established a partnership with industry, the United States Computer Readiness… CONTINUE READING