DC Field | Value | Language |
---|---|---|
dc.contributor.author | Avgerinos, Thanassis | ko |
dc.contributor.author | Cha, Sang Kil | ko |
dc.contributor.author | Rebert, Alexandre | ko |
dc.contributor.author | Schwartz, Edward J. | ko |
dc.contributor.author | Woo, Maverick | ko |
dc.contributor.author | Brumley, David | ko |
dc.date.accessioned | 2016-04-14T03:00:42Z | - |
dc.date.available | 2016-04-14T03:00:42Z | - |
dc.date.created | 2015-11-24 | - |
dc.date.created | 2015-11-24 | - |
dc.date.created | 2015-11-24 | - |
dc.date.issued | 2014-02 | - |
dc.identifier.citation | COMMUNICATIONS OF THE ACM, v.57, no.2, pp.74 - 84 | - |
dc.identifier.issn | 0001-0782 | - |
dc.identifier.uri | http://hdl.handle.net/10203/203757 | - |
dc.language | English | - |
dc.publisher | ASSOC COMPUTING MACHINERY | - |
dc.subject | SYMBOLIC EXECUTION | - |
dc.title | Automatic Exploit Generation | - |
dc.type | Article | - |
dc.identifier.wosid | 000330864200022 | - |
dc.identifier.scopusid | 2-s2.0-84893424795 | - |
dc.type.rims | ART | - |
dc.citation.volume | 57 | - |
dc.citation.issue | 2 | - |
dc.citation.beginningpage | 74 | - |
dc.citation.endingpage | 84 | - |
dc.citation.publicationname | COMMUNICATIONS OF THE ACM | - |
dc.identifier.doi | 10.1145/2560217.2560219 | - |
dc.contributor.localauthor | Cha, Sang Kil | - |
dc.contributor.nonIdAuthor | Avgerinos, Thanassis | - |
dc.contributor.nonIdAuthor | Rebert, Alexandre | - |
dc.contributor.nonIdAuthor | Schwartz, Edward J. | - |
dc.contributor.nonIdAuthor | Woo, Maverick | - |
dc.contributor.nonIdAuthor | Brumley, David | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordPlus | SYMBOLIC EXECUTION | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.