Login / Signup

1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing.

Songtao YangYubo HeKaixiang ChenZheyu MaXiapu LuoYong XieJianjun ChenChao Zhang
Published in: ISSTA (2023)
Keyphrases
  • information security
  • security vulnerabilities
  • countermeasures
  • intrusion detection
  • security risks
  • hidden markov models
  • operating system