Back to Results
First PageMeta Content
Computer memory / Computing / Software bugs / Software engineering / Cyberwarfare / Buffer overflow / Program analysis / Control flow graph / Data buffer / Data-flow analysis / Vulnerability


Transformation-aware Exploit Generation using a HICFG Dan Caselden Alex Bazhanyuk Mathias Payer Laszlo Szekeres
Add to Reading List

Document Date: 2016-06-13 11:08:40


Open Document

File Size: 508,78 KB

Share Result on Facebook