共 2 条
[2]
A first steptowards automated detection of buffer overrun vulnerabilities .2 Wagner D,Foster J S,Brewer E A,et al. Proceedings of the Network and Distributed SystemSecurity Symposium,NDSS 2000 . 2000