| dc.contributor.author | Bundt, Joshua | |
| dc.contributor.author | Fasano, Andrew | |
| dc.contributor.author | Dolan-Gavitt, Brendan | |
| dc.contributor.author | Robertson, William | |
| dc.contributor.author | Leek, Tim | |
| dc.date.accessioned | 2022-10-25T18:31:53Z | |
| dc.date.available | 2022-10-25T18:31:53Z | |
| dc.date.issued | 2021-05-24 | |
| dc.identifier.isbn | 978-1-4503-8287-8 | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/145988 | |
| dc.publisher | ACM|Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security | en_US |
| dc.relation.isversionof | https://doi.org/10.1145/3433210.3453096 | en_US |
| dc.rights | Creative Commons Attribution 4.0 International license | en_US |
| dc.rights.uri | https://creativecommons.org/licenses/by-sa/4.0/ | en_US |
| dc.source | ACM|Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security | en_US |
| dc.title | Evaluating Synthetic Bugs | en_US |
| dc.type | Article | en_US |
| dc.identifier.citation | Bundt, Joshua, Fasano, Andrew, Dolan-Gavitt, Brendan, Robertson, William and Leek, Tim. 2021. "Evaluating Synthetic Bugs." | |
| dc.contributor.department | Lincoln Laboratory | |
| dc.identifier.mitlicense | PUBLISHER_CC | |
| dc.eprint.version | Final published version | en_US |
| dc.type.uri | http://purl.org/eprint/type/ConferencePaper | en_US |
| eprint.status | http://purl.org/eprint/status/NonPeerReviewed | en_US |
| dc.date.updated | 2022-10-25T08:35:45Z | |
| dc.language.rfc3066 | en | |
| dc.rights.holder | The author(s) | |
| dspace.date.submission | 2022-10-25T08:35:45Z | |
| mit.license | PUBLISHER_CC | |
| mit.metadata.status | Authority Work and Publication Information Needed | en_US |