Login / Signup

Tutorial: Detecting Memory Vulnerabilities in the Components of System Code using PROMPT.

Tuba YavuzKen Yihang Bai
Published in: SecDev (2020)
Keyphrases
  • countermeasures
  • data sets
  • source code
  • memory usage
  • automatic detection
  • limited memory
  • real time
  • data mining
  • computational complexity
  • object oriented
  • main memory
  • memory requirements
  • memory space