Login / Signup
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump.
Jun Xu
Dongliang Mu
Ping Chen
Xinyu Xing
Pei Wang
Peng Liu
Published in:
CCS (2016)
Keyphrases
</>
data corruption
model averaging
buffer overflow
low memory
memory usage
website
memory requirements
computing power
computational power
limited memory
databases
main memory
risk assessment
associative memory
memory size
information processing
genetic algorithm
neural network