@dblp

Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation.

, , , , and . login Usenix Mag., (2011)

Links and resources

Tags