Check out the new USENIX Web site. next up previous
Next: Lexical Techniques. Up: Detecting Format String Vulnerabilities Previous: 5.4 Evaluation


6 Related Work



Subsections

Umesh Shankar 2001-05-16