Buffer Overrun Vulnerabilities David Wagner Jeffrey S. Foster Eric A. Brewer University of California / C library / /
IndustryTerm
real-world applications / computing / constraint systems / constraint generation algorithm / infamous Internet worm / least solution / legacy applications / trouble handling large applications / e-> / deployed software package / /
OperatingSystem
Linux / /
Organization
University of California / Berkeley / National Aeronautics and Space Administration / Buffer Overrun Vulnerabilities David Wagner Jeffrey S. Foster Eric A. Brewer University / /
Position
tion Young Investigator / security auditor / programmer / /
ProgrammingLanguage
R / C / /
ProvinceOrState
California / /
Technology
constraint generation algorithm / DNS / Linux / API / /