Login / Signup
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting.
Sherri Sparks
Shawn Embleton
Ryan Cunningham
Cliff Changchun Zou
Published in:
ACSAC (2007)
Keyphrases
</>
control flow
data flow
software testing
transition systems
genetic algorithm
business process models
process model
reactive systems
open source
modeling language
multi agent
case study
test cases
databases
evolutionary computation
object oriented
workflow management systems
database systems
real world