You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The motivation for this example is to show a bottom-up spec writing approach. A programmer is writing some code that should do X, and has some notion of what the correct functionality should be (e.g. do some operation, or just avoid memory errors). Show how writing these specs would prevent a real-world CVE.
I looked at CVEs related to popular C network stacks, and picked the ones that seemed relevant, specifically:
Summary
The motivation for this example is to show a bottom-up spec writing approach. A programmer is writing some code that should do X, and has some notion of what the correct functionality should be (e.g. do some operation, or just avoid memory errors). Show how writing these specs would prevent a real-world CVE.
I looked at CVEs related to popular C network stacks, and picked the ones that seemed relevant, specifically:
Do
The text was updated successfully, but these errors were encountered: