dc.contributor.author | Bundt, Joshua | |
dc.contributor.author | Fasano, Andrew | |
dc.contributor.author | Dolan-Gavitt, Brendan | |
dc.contributor.author | Robertson, William | |
dc.contributor.author | Leek, Tim | |
dc.date.accessioned | 2022-10-25T18:31:53Z | |
dc.date.available | 2022-10-25T18:31:53Z | |
dc.date.issued | 2021-05-24 | |
dc.identifier.isbn | 978-1-4503-8287-8 | |
dc.identifier.uri | https://hdl.handle.net/1721.1/145988 | |
dc.publisher | ACM|Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security | en_US |
dc.relation.isversionof | https://doi.org/10.1145/3433210.3453096 | en_US |
dc.rights | Creative Commons Attribution 4.0 International license | en_US |
dc.rights.uri | https://creativecommons.org/licenses/by-sa/4.0/ | en_US |
dc.source | ACM|Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security | en_US |
dc.title | Evaluating Synthetic Bugs | en_US |
dc.type | Article | en_US |
dc.identifier.citation | Bundt, Joshua, Fasano, Andrew, Dolan-Gavitt, Brendan, Robertson, William and Leek, Tim. 2021. "Evaluating Synthetic Bugs." | |
dc.contributor.department | Lincoln Laboratory | |
dc.identifier.mitlicense | PUBLISHER_CC | |
dc.eprint.version | Final published version | en_US |
dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
dc.date.updated | 2022-10-25T08:35:45Z | |
dc.language.rfc3066 | en | |
dc.rights.holder | The author(s) | |
dspace.date.submission | 2022-10-25T08:35:45Z | |
mit.license | PUBLISHER_CC | |
mit.metadata.status | Authority Work and Publication Information Needed | en_US |