sponsors
usenix conference policies
Media Coverage
Xi Wang on "Towards Optimization–Safe Sytems: Analyzing the Impact of Undefined Behavior"
Watch or listen to this presentation
- USENIX: Unstable code can lead to security vulnerabilities (Computerworld, 6.19.14)
- USENIX: Unstable code can lead to security vulnerabilities (ITWorld, 6.19.14)
- USENIX: Unstable code can lead to security vulnerabilities (CIO, 6.19.14)
- USENIX: Unstable code can lead to security vulnerabilities (PCWorld, 6.19.14)
- USENIX: Unstable code can lead to security vulnerabilities (Computerworld UK, 6.19.14)
- Overeager Compilers Can Open Security Holes in Your Code (Slashdot, 6.20.14)
- USENIX: Unstable code can lead to security vulnerabilities (CIO Australia, 6.20.14)
- USENIX: Unstable code can lead to security vulnerabilities (Computerworld Singapore, 6.20.14)
- USENIX: Unstable code can lead to security vulnerabilities (ARNnet Australia, 6.20.14)
connect with us