• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Exploit dynamic data flows to protect software against semantic attacks.

Kaiyuan KuangZhanyong TangXiaoqing GongDingyi FangXiaojiang ChenHeng ZhangJie LiuZheng Wang
Published in: SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI (2017)
Keyphrases