Login / Signup
MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures.
Yang Xiao
Bihuan Chen
Chendong Yu
Zhengzi Xu
Zimu Yuan
Feng Li
Binghong Liu
Yang Liu
Wei Huo
Wei Zou
Wenchang Shi
Published in:
USENIX Security Symposium (2020)
Keyphrases
</>
security vulnerabilities
attack graphs
buffer overflow
information security
security risks
automatic detection
signature verification
decision making
anomaly detection
intrusion detection
database design
risk assessment
attack graph