Login / Signup
Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths.
Xiaokui Shu
Danfeng Yao
Naren Ramakrishnan
Published in:
CCS (2015)
Keyphrases
</>
execution paths
test cases
event calculus
constraint language
constraint satisfaction
software systems
knowledge representation
reasoning tasks
deductive databases