Sign in

How professional hackers understand protected code while performing attack tasks.

Mariano CeccatoPaolo TonellaCataldo BasileBart CoppensBjorn De SutterPaolo FalcarinMarco Torchiano
Published in: ICPC (2017)
Keyphrases
  • penetration testing
  • source code
  • deeper understanding
  • security vulnerabilities
  • data sets
  • data mining
  • machine learning
  • search engine
  • digital images
  • countermeasures