Back to Results
First PageMeta Content



Exploit Programming From Buffer Overflows to “Weird Machines” and Theory of Computation Se r g e y B r a t u s , M i c h a e l E . L o c a s t o , M e r e d i t h L . P a t t e r s o n , Le n S a s s a m a n , a n d
Add to Reading List

Document Date: 2011-12-01 04:09:18


Open Document

File Size: 174,50 KB

Share Result on Facebook
UPDATE