Team for Research in
Ubiquitous Secure Technology

Finding Application Errors and Security Flaws Using PQL: a Program Query Language.
Michael Martin, Benjamin Livshits, Monica Lam

Citation
Michael Martin, Benjamin Livshits, Monica Lam. "Finding Application Errors and Security Flaws Using PQL: a Program Query Language.". Object-Oriented Programming, Systems, Languages and Applications (OOPSLA), October, 2005.

Abstract
(No abstract.)

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Michael Martin, Benjamin Livshits, Monica Lam. <a
    href="http://www.truststc.org/pubs/397.html"
    >Finding Application Errors and Security Flaws Using PQL:
    a Program Query Language.</a>, Object-Oriented
    Programming, Systems, Languages and Applications (OOPSLA),
    October, 2005.
  • Plain text
    Michael Martin, Benjamin Livshits, Monica Lam. "Finding
    Application Errors and Security Flaws Using PQL: a Program
    Query Language.". Object-Oriented Programming, Systems,
    Languages and Applications (OOPSLA), October, 2005.
  • BibTeX
    @inproceedings{MartinLivshitsLam05_FindingApplicationErrorsSecurityFlawsUsingPQLProgram,
        author = {Michael Martin and Benjamin Livshits and Monica Lam},
        title = {Finding Application Errors and Security Flaws
                  Using PQL: a Program Query Language.},
        booktitle = {Object-Oriented Programming, Systems, Languages
                  and Applications (OOPSLA)},
        month = {October},
        year = {2005},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/397.html}
    }
    

Posted by Jessica Gamble on 7 May 2008.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.