Login / Signup
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits.
Tiffany Bao
Ruoyu Wang
Yan Shoshitaishvili
David Brumley
Published in:
IEEE Symposium on Security and Privacy (2017)
Keyphrases
</>
real time
fully automatic
computer vision
semi automatic
information retrieval
metadata
wide range
database
data sets
real world
genetic algorithm
information systems
decision making
image processing
multi agent
takes advantage