Login / Signup
Tutorial: Detecting Memory Vulnerabilities in the Components of System Code using PROMPT.
Tuba Yavuz
Ken Yihang Bai
Published in:
SecDev (2020)
Keyphrases
</>
countermeasures
data sets
source code
memory usage
automatic detection
limited memory
real time
data mining
computational complexity
object oriented
main memory
memory requirements
memory space