Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach.
Lokesh JainAditya ChandranSanjay RawatKannan SrinathanPublished in: ICISS (2016)
Keyphrases
- flow graph
- flow graphs
- random walk
- similarity measure
- control system
- shortest path
- control method
- information flow
- control theory
- structural similarity
- real time
- edit distance
- basis functions
- control algorithm
- robotic systems
- semantic similarity
- similarity function
- euclidean distance
- computer systems
- rough sets
- co occurrence
- fuzzy logic
- databases