Login / Signup

Revealing the exploitability of heap overflow through PoC analysis.

Qintao ShenGuozhu MengKai Chen
Published in: Cybersecur. (2024)
Keyphrases
  • databases
  • case study
  • pattern recognition
  • data analysis
  • information retrieval
  • feature selection
  • image processing
  • multimedia
  • similarity measure
  • data structure
  • statistical analysis