Login / Signup

Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses.

Fang YuMuath AlkhalafTevfik Bultan
Published in: ASE (2009)
Keyphrases