Login / Signup
Finding Memory Vulnerabilities in Protocol Stack Implementations using Hybrid Program Analysis.
Farhaan Fowze
Tuba Yavuz
Published in:
NSysS (2021)
Keyphrases
</>
protocol stack
real time
information systems
multimedia
source code
data processing
software systems
wireless communication
embedded systems
tcp ip
data corruption