Login / Signup

Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs.

Mohamad MansouriJun XuGeorgios Portokalidis
Published in: AsiaCCS (2023)
Keyphrases
  • computer programs
  • information security
  • real time
  • databases
  • non binary
  • machine learning
  • fixpoint
  • security mechanisms
  • learning algorithm
  • high level
  • data structure
  • anomaly detection
  • binary data
  • provably correct