<--- Back to Details
First PageDocument Content
Date: 2011-12-01 04:09:18

Exploit Programming From Buffer Overflows to “Weird Machines” and Theory of Computation Se r g e y B r a t u s , M i c h a e l E . L o c a s t o , M e r e d i t h L . P a t t e r s o n , Le n S a s s a m a n , a n d

Add to Reading List

Source URL: langsec.org

Download Document from Source Website

File Size: 174,50 KB

Share Document on Facebook

Similar Documents