Login / Signup

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration.

Juan CaballeroZhenkai LiangPongsin PoosankamDawn Song
Published in: RAID (2009)
Keyphrases
  • guided exploration
  • exploratory learning
  • lightweight
  • signature scheme
  • public key
  • signature verification