![](https://www.pdfsearch.io/img/93405370d12dc563bc48ab732c747f56.jpg) Date: 2011-12-01 04:09:18
| | Exploit Programming From Buffer Overflows to “Weird Machines” and Theory of Computation Se r g e y B r a t u s , M i c h a e l E . L o c a s t o , M e r e d i t h L . P a t t e r s o n , Le n S a s s a m a n , a n d Add to Reading ListSource URL: langsec.orgDownload Document from Source Website File Size: 174,50 KBShare Document on Facebook
|