Cited By
View all- Prakash AYin HLiang ZChen KXie QQiu WLi NTzeng W(2013)Enforcing system-wide control flow integrity for exploit detection and diagnosisProceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security10.1145/2484313.2484352(311-322)Online publication date: 8-May-2013
- Schack-Nielsen ASchürmann C(2010)Curry-Style explicit substitutions for the linear and affine lambda calculusProceedings of the 5th international conference on Automated Reasoning10.1007/978-3-642-14203-1_1(1-14)Online publication date: 16-Jul-2010