Effective blame for information-flow violations release_pdmipsonjrhupa7y7es3uut7v4

by Dave King, Trent Jaeger, Somesh Jha, Sanjit A. Seshia

Published in ACM SIGSOFT Conference on the Foundations of Software Engineering by ACM Press.

2008   p250-260

Archived Files and Locations

application/pdf   579.9 kB
file_hcisaj3gsjhd5nzo7wqvngi7ya
static.aminer.org (aggregator)
web.archive.org (webarchive)
application/pdf   327.7 kB
file_rs2nmslda5a7znltmzde2cygee
web.archive.org (webarchive)
www.eecs.berkeley.edu (web)
application/pdf   343.1 kB
file_2a2msj5prrcxnfwwjo7lz74wlq
web.archive.org (webarchive)
www.cse.psu.edu (web)
Read Archived PDF
Preserved and Accessible
Type  paper-conference
Stage   published
Year   2008
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 9cca7409-5a9c-476a-8408-d99301b0463e
API URL: JSON