The process by which different classes of fields are identified, modified, and replayed is a manual process based on the semantics ... Replaying the execution of a program has been the focus of numerous projects [3, 1 1 , 16, 17, 23, 25]. ... The solution developed in this paper makes novel use of programming language techniques such as theorem proving and ... [5] P Bosch, A Carloganu, and D Etiemble.
Title | : | ACM Conference on Computer and Communications Security |
Author | : | Rebecca N. Wright, Sabrina De Capitani di Vimercati, Vitaly Shmatikov |
Publisher | : | - 2006 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: