Automated Source Code Instrumentation for Verifying Potential Vulnerabilities
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hakjoo Oh | - |
dc.date.accessioned | 2021-08-28T16:25:50Z | - |
dc.date.available | 2021-08-28T16:25:50Z | - |
dc.date.created | 2021-04-22 | - |
dc.date.issued | 2016-05-31 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/29008 | - |
dc.publisher | IFIP | - |
dc.title | Automated Source Code Instrumentation for Verifying Potential Vulnerabilities | - |
dc.title.alternative | Automated Source Code Instrumentation for Verifying Potential Vulnerabilities | - |
dc.type | Conference | - |
dc.contributor.affiliatedAuthor | Hakjoo Oh | - |
dc.identifier.bibliographicCitation | IFIP SEC 2016: International Information Security and Privacy Conference | - |
dc.relation.isPartOf | IFIP SEC 2016: International Information Security and Privacy Conference | - |
dc.relation.isPartOf | Proceedings of the International Information Security and Privacy Conference | - |
dc.citation.title | IFIP SEC 2016: International Information Security and Privacy Conference | - |
dc.citation.conferencePlace | BE | - |
dc.citation.conferencePlace | Ghent | - |
dc.citation.conferenceDate | 2016-05-30 | - |
dc.type.rims | CONF | - |
dc.description.journalClass | 1 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.