Login / Signup
Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.
Juan Caballero
Zhenkai Liang
Pongsin Poosankam
Dawn Song
Published in:
RAID (2009)
Keyphrases
</>
guided exploration
exploratory learning
lightweight
signature scheme
public key
signature verification