SIGN IN
SIGN UP
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Full Text:
PDF
Get this Article
Authors:
Emre C. Sezer
North Carolina State University, Raleigh, NC
Peng Ning
North Carolina State University, Raleigh, NC
Chongkyung Kil
North Carolina State University, Raleigh, NC
Jun Xu
Google, Inc., Mountain View, CA
2007 Article
Bibliometrics
· Downloads (6 Weeks): 1
· Downloads (12 Months): 17
· Downloads (cumulative): 631
· Citation Count: 3
Published in:
· Proceeding
CCS '07
Proceedings of the 14th ACM conference on Computer and communications security
Pages 562-572
ACM
New York, NY
, USA
©2007
table of contents
ISBN: 978-1-59593-703-2
doi>
10.1145/1315245.1315314
Tools and Resources
Buy this Article
Recommend the ACM DL
to your organization
Request Permissions
TOC Service:
Email
RSS
Save to Binder
Export Formats:
BibTeX
EndNote
ACM Ref
Upcoming Conference:
CCS'16
Share:
|
Author Tags
debugging
experimentation
intrusion/anomaly detection and malware mitigation
memory corruption
operating systems security
security
vulnerability analysis
Contact Us
|
Switch to
single page view
(no tabs)
**Javascript is not enabled and is required for the "tabbed view" or switch to the
single page view
**
Advertisements
Powered by
Did you know the ACM DL App is now available?
Did you know your Organization can subscribe to the ACM Digital Library?
The ACM Guide to Computing Literature
All Tags
Export Formats
Save to Binder