Pointless tainting? Evaluating the practicality of pointer tainting

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Original languageEnglish
Title of host publicationProceedings of EUROSYS'09
Place of PublicationNuremberg
PublisherACM
Publication statusPublished - 2009

Cite this