Cited By
View all- Lipp SBanescu SPretschner ARyu SSmaragdakis Y(2022)An empirical study on the effectiveness of static C code analyzers for vulnerability detectionProceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3533767.3534380(544-555)Online publication date: 18-Jul-2022
- Stroggylos KMitropoulos DTzermias ZPapadopoulos PRafailidis FSpinellis DIoannidis SKatsaros PSokratis KMichael HTheodoros ADimosthenis AElias CTheodora VMara N(2014)Securing Legacy Code with the TRACER PlatformProceedings of the 18th Panhellenic Conference on Informatics10.1145/2645791.2645796(1-6)Online publication date: 2-Oct-2014
- Rafailidis FPanagos IKatsaros PArvanitidis AKetikidis PMargaritis KVlahavas IChatzigeorgiou AEleftherakis GStamelos I(2013)Inlined monitors for security policy enforcement in web applicationsProceedings of the 17th Panhellenic Conference on Informatics10.1145/2491845.2491861(75-82)Online publication date: 19-Sep-2013
- Show More Cited By