skip to main content
column

Session Summary: Time Vulnerabilities

Published:13 July 2016Publication History
First page image

References

  1. ISO/IEC. TR 24772:2013---Information Technology---Programming Languages---Guidance to avoiding vulnerabilities in programming languages through language selection and use. International Standards Organization, Geneva, Switzerland, 2013.Google ScholarGoogle Scholar
  2. M. Masmano, I. Ripoll, A. Crespo, and J. Metge. Xtratum: a hypervisor for safety critical embedded systems. In 11th Real-Time Linux Workshop, pages 263--272, 2009.Google ScholarGoogle Scholar
  3. S. Michell. Time issues in programs vulnerabilities for programming languages and systems. In 18th International Real-Time Ada Workshop, IRTAW-18, Benicàssim, Spain, April 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM SIGAda Ada Letters
    ACM SIGAda Ada Letters  Volume 36, Issue 1
    June 2016
    98 pages
    ISSN:1094-3641
    DOI:10.1145/2971571
    Issue’s Table of Contents

    Copyright © 2016 Authors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 13 July 2016

    Check for updates

    Qualifiers

    • column
  • Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader
About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!