
- A. Burns, B.Dobbing, and T. Vardanega. Guide for the use of the Ada Ravenscar Profile in high integrity systems. Technical Report YCS-2003-348, University of York, Department of Computer Science, 2003.Google Scholar
- A. Burns and A. J. Wellings. Real-Time Systems and Programming Languages. Addison Wesley Longman, 4th edition, 2009. Google Scholar
Digital Library
- G.F. Coulouris, J. Dollimore, and T. Kindberg. Distributed Systems, Concepts and Design. AddisonWesley, 4th edition, 2005. Google Scholar
Digital Library
- ISO/IEC. Information technology -- programming languages -- guide for the use of the Ada Ravenscar Profile in high integrity systems. Technical Report TR 24718, ISO/IEC, 2005.Google Scholar
- ISO/IEC. Information technology -- programming languages -- guidelines to avoiding vulnerabilities in language selection and use. Technical Report PDTR 24772 -- draft, ISO/IEC, 2009.Google Scholar
Recommendations
Mitigating program security vulnerabilities: Approaches and challenges
Programs are implemented in a variety of languages and contain serious vulnerabilities which might be exploited to cause security breaches. These vulnerabilities have been exploited in real life and caused damages to related stakeholders such as program ...
Detecting concurrency memory corruption vulnerabilities
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringMemory corruption vulnerabilities can occur in multithreaded executions, known as concurrency vulnerabilities in this paper. Due to non-deterministic multithreaded executions, they are extremely difficult to detect. Recently, researchers tried to apply ...






Comments