Login / Signup

Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting.

Sherri SparksShawn EmbletonRyan CunninghamCliff Changchun Zou
Published in: ACSAC (2007)
Keyphrases