Login / Signup
Exploiting the Hard-Working DWARF: Trojan and Exploit Techniques with No Native Executable Code.
James Oakley
Sergey Bratus
Published in:
WOOT (2011)
Keyphrases
</>
source code
formal specification
data sets
neural network
code generation
information retrieval
artificial intelligence
static analysis
control flow
malicious code
code snippets