- A. Burns, B.Dobbing, and T. Vardanega. Guide for the use of the Ada Ravenscar Profile in high integrity systems. Technical Report YCS-2003-348, University of York, Department of Computer Science, 2003.Google Scholar
- A. Burns and A. J. Wellings. Real-Time Systems and Programming Languages. Addison Wesley Longman, 4th edition, 2009. Google ScholarDigital Library
- G.F. Coulouris, J. Dollimore, and T. Kindberg. Distributed Systems, Concepts and Design. AddisonWesley, 4th edition, 2005. Google ScholarDigital Library
- ISO/IEC. Information technology -- programming languages -- guide for the use of the Ada Ravenscar Profile in high integrity systems. Technical Report TR 24718, ISO/IEC, 2005.Google Scholar
- ISO/IEC. Information technology -- programming languages -- guidelines to avoiding vulnerabilities in language selection and use. Technical Report PDTR 24772 -- draft, ISO/IEC, 2009.Google Scholar
Recommendations
Detecting concurrency memory corruption vulnerabilities
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringMemory corruption vulnerabilities can occur in multithreaded executions, known as concurrency vulnerabilities in this paper. Due to non-deterministic multithreaded executions, they are extremely difficult to detect. Recently, researchers tried to apply ...
Security vulnerabilities and mitigation techniques of web applications
SIN '13: Proceedings of the 6th International Conference on Security of Information and NetworksWeb applications contain vulnerabilities, which may lead to serious security breaches such as stealing of confidential information. To protect against security breaches, it is necessary to understand the detailed steps of attacks and the pros and cons ...
Comments