Sign in

On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities.

Zhen LiNing WangDeqing ZouYating LiRuqian ZhangShouhuai XuChao ZhangHai Jin
Published in: CoRR (2024)
Keyphrases
  • higher level
  • lower level
  • security patterns
  • data mining
  • social networks
  • image segmentation
  • object oriented
  • information security
  • levels of abstraction
  • security vulnerabilities
  • attack graphs