Login / Signup
Return to the Zombie Gadgets: Undermining Destructive Code Reads via Code Inference Attacks.
Kevin Z. Snow
Roman Rogowski
Jan Werner
Hyungjoon Koo
Fabian Monrose
Michalis Polychronakis
Published in:
IEEE Symposium on Security and Privacy (2016)
Keyphrases
</>
source code
artificial intelligence
high level
machine learning
genetic algorithm
social networks
decision trees
case study