Filter your results
- 3
- 3
- 3
- 1
- 1
- 1
- 3
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Using testing techniques for vulnerability detection in C programs23th International Conference on Testing Software and Systems (ICTSS), Nov 2011, Paris, France. pp.80-96, ⟨10.1007/978-3-642-24580-0_7⟩
Conference papers
hal-01303013v1
|
||
|
Formal Software Verification: How Close Are We?Joint 12th IFIP WG 6.1 International Conference on Formal Methods for Open Object-Based Distributed Systems (FMOODS) / 30th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2010, Amsterdam, Netherlands. pp.1, ⟨10.1007/978-3-642-13464-7_1⟩
Conference papers
hal-01055211v1
|
||
|
How Current Android Malware Seeks to Evade Automated Code Analysis9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Crete, Greece. pp.187-202, ⟨10.1007/978-3-319-24018-3_12⟩
Conference papers
hal-01442542v1
|