Login / Signup
Bytecode Corruption Attacks Are Real - And How to Defend Against Them.
Taemin Park
Julian Lettner
Yeoul Na
Stijn Volckaert
Michael Franz
Published in:
DIMVA (2018)
Keyphrases
</>
java card
source code
countermeasures
neural network
cooperative
static analysis
data corruption
digital images
programming language
open source
intrusion detection
smart card
virtual machine
computer security
security protocols
denial of service attacks