Static application security testing: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Add: pages, issue, volume. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox2 | #UCB_webform_linked 1930/2384
Citation bot (talk | contribs)
Alter: title, template type. Add: isbn, chapter. Removed parameters. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox3 | #UCB_webform_linked 1638/1947
Line 116:
 
At a function level, a common technique is the construction of an [[Abstract syntax tree]] to control the flow of data within the function.<ref>
{{Cite journalbook
|last1=Yamaguchi|first1=Fabian
|last2=Lottmann|first2=Markus
|last3=Rieck|first3=Konrad
|journaltitle=Proceedings of the 28th Annual Computer Security Applications Conference
|titlechapter=Generalized vulnerability extrapolation using abstract syntax trees
|s2cid=8970125
|date=December 2012
|title=Generalized vulnerability extrapolation using abstract syntax trees
|journal=Proceedings of the 28th Annual Computer Security Applications Conference
|volume=2
|issue=4
Line 129:
|publisher=IEEE
|doi=10.1145/2420950.2421003
|isbn=9781450313124
}}</ref>