Login / Signup

Finding Memory Vulnerabilities in Protocol Stack Implementations using Hybrid Program Analysis.

Farhaan FowzeTuba Yavuz
Published in: NSysS (2021)
Keyphrases
  • protocol stack
  • real time
  • information systems
  • multimedia
  • source code
  • data processing
  • software systems
  • wireless communication
  • embedded systems
  • tcp ip
  • data corruption