[ACM Press the 17th ACM conference - Chi
✍
Caballero, Juan; Poosankam, Pongsin; McCamant, Stephen; Babi ć, Domagoj; Song, D
📂
Article
📅
2010
🏛
ACM Press
⚖ 499 KB
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before they are exploited. But there has been little research on the converse question of whether defenders can turn the tables