Team for Research in
Ubiquitous Secure Technology

Improving Software Security with A C Pointer Alias Analysis

Citation
"Improving Software Security with A C Pointer Alias Analysis". Avots, D., Dalton, M., Livshits, V. B., and Lam, M. S (eds.), 27th International Conference on Software Engineering, May, 2005.

Abstract
(No abstract.)

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
     <a
    href="http://www.truststc.org/pubs/582.html"
    ><i>Improving Software Security with A C Pointer
    Alias Analysis</i></a>, Avots, D., Dalton, M.,
    Livshits, V. B., and Lam, M. S (eds.), 27th International
    Conference on Software Engineering, May, 2005.
  • Plain text
     "Improving Software Security with A C Pointer Alias
    Analysis". Avots, D., Dalton, M., Livshits, V. B., and
    Lam, M. S (eds.), 27th International Conference on Software
    Engineering, May, 2005.
  • BibTeX
    @proceedings{AvotsDDaltonMLivshitsBLamS05_ImprovingSoftwareSecurityWithCPointerAliasAnalysis,
        title = {Improving Software Security with A C Pointer Alias
                  Analysis},
        editor = {Avots, D., Dalton, M., Livshits, V. B., and Lam,
                  M. S},
        organization = {27th International Conference on Software
                  Engineering},
        month = {May},
        year = {2005},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/582.html}
    }
    

Posted by Jessica Gamble on 13 Mar 2009.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.