Login / Signup
How Double-Fetch Situations turn into Double-Fetch Vulnerabilities: A Study of Double Fetches in the Linux Kernel.
Pengfei Wang
Jens Krinke
Kai Lu
Gen Li
Steve Dodier-Lazaro
Published in:
USENIX Security Symposium (2017)
Keyphrases
</>
learning algorithm
data model
operating system
neural network
case study
reinforcement learning
software engineering
access control
countermeasures