Login / Signup

Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach.

Lokesh JainAditya ChandranSanjay RawatKannan Srinathan
Published in: ICISS (2016)
Keyphrases