Inproceedings,

Uncovering access control weaknesses and flaws with security-discordant software clones.

, , and .
ACSAC, page 209-218. ACM, (2013)

Meta data

Tags

Users

  • @dblp

Comments and Reviews