Back to Results
First PageMeta Content
Computing / Computer security / Cyberwarfare / Computer network security / Secure communication / Hacking / Software testing / Vulnerability / Resource fork / Firewall / Resource / Electronic filter


Jigsaw: Protecting Resource Access by Inferring Programmer Expectations Hayawardh Vijayakumar and Xinyang Ge, The Pennsylvania State University; Mathias Payer, University of California, Berkeley; Trent Jaeger, The Pennsy
Add to Reading List

Document Date: 2016-06-13 11:08:40


Open Document

File Size: 485,51 KB

Share Result on Facebook