
- ISO/IEC. TR 24772:2013---Information Technology---Programming Languages---Guidance to avoiding vulnerabilities in programming languages through language selection and use. International Standards Organization, Geneva, Switzerland, 2013.Google Scholar
- M. Masmano, I. Ripoll, A. Crespo, and J. Metge. Xtratum: a hypervisor for safety critical embedded systems. In 11th Real-Time Linux Workshop, pages 263--272, 2009.Google Scholar
- S. Michell. Time issues in programs vulnerabilities for programming languages and systems. In 18th International Real-Time Ada Workshop, IRTAW-18, Benicàssim, Spain, April 2016.Google Scholar
Digital Library
Recommendations
Debugging methodology (Session Summary)
SIGSOFT '83: Proceedings of the ACM SIGSOFT/SIGPLAN software engineering symposium on High-level debuggingTwo sessions were held on the general topic of debugging methodology. Both were moderated by R. Stockton Gaines. During the first session five speakers presented short talks on their workshop submissions. Each talk was followed by a brief question and ...
Session summary
HLT '91: Proceedings of the workshop on Speech and Natural LanguageIn this session, several sites presented videos or demos to illustrate research progress and demonstrate operation of their spoken language system. Since papers were optional for this session, the proceedings do not completely reflect the ...
Session Management Vulnerabilities in Today's Web
Many cyber attacks exploit session management vulnerabilities that allow recognition of attackers as valid website users. Under these fake identities, attackers can steal sensitive data, alter private settings, and compromise website structure and ...






Comments