Publication | Closed Access
Exploit Programming: From Buffer Overflows to "Weird Machines" and Theory of Computation.
85
Citations
0
References
2011
Year
Theory Of ComputingProgramming Language TheoryAbstract MachineEngineeringProgram AnalysisComputer EngineeringComputer ArchitectureWeird MachinesComputational ParadigmParallel ProgrammingComputer ScienceParallel ComputingModel Of ComputationBuffer OverflowsProgramming Languages
No additional data available for this publication yet. Check back later!