<--- Back to Details
First PageDocument Content
Software testing / Address space layout randomization / Computer network security / Binary hardening / Code injection / SQL injection / Heap / Vulnerability / GrammaTech / Computer security
Date: 2015-10-27 14:35:32
Software testing
Address space layout randomization
Computer network security
Binary hardening
Code injection
SQL injection
Heap
Vulnerability
GrammaTech
Computer security

REPORT DOCUMENTATION PAGE

Add to Reading List

Source URL: samate.nist.gov

Download Document from Source Website

File Size: 3,66 MB

Share Document on Facebook

Similar Documents

Theoretical computer science / Computing / Logic in computer science / Electronic design automation / Formal methods / NP-complete problems / Constraint programming / Satisfiability modulo theories / Benchmark / Solver / Standard Performance Evaluation Corporation / Computer performance

Satisfiability Modulo Theories Competition (SMT-COMP) 2014: Rules and Procedures David R. Cok GrammaTech, Inc. Ithaca, NY (USA)

DocID: 1xVTO - View Document

Theoretical computer science / Software engineering / Constraint programming / Computing / Formal methods / Logic in computer science / Electronic design automation / NP-complete problems / Satisfiability modulo theories / Solver / SMT / Constraint satisfaction problem

The SMT-LIBv2 Language and Tools: A Tutorial David R. Cok GrammaTech, Inc. VersionNovember 23, 2013

DocID: 1xUta - View Document

PRODUCT DATA SHEET CODESONAR FOR BINARIES Intel and ARM Processors

DocID: 1sVR3 - View Document

Association for Computing Machinery / Programming Language Design and Implementation / Computer science / Computing / SIGPLAN / GrammaTech / Computer programmers / Susan B. Horwitz / Astre

Cindy Rubio González University of California, Davis Department of Computer Science 3039 Kemper Hall, Davis, CAE-mail:

DocID: 1ps54 - View Document

Software testing / Address space layout randomization / Computer network security / Binary hardening / Code injection / SQL injection / Heap / Vulnerability / GrammaTech / Computer security

REPORT DOCUMENTATION PAGE

DocID: 1pe8m - View Document