Login / Signup
Estimates of success rates of remote arbitrary code execution attacks.
Teodor Sommestad
Hannes Holm
Mathias Ekstedt
Published in:
Inf. Manag. Comput. Secur. (2012)
Keyphrases
</>
success rate
code generation
malicious code
data flow
source code
countermeasures
static analysis
control flow
watermarking scheme
java card
malicious attacks
java virtual machine
estimation error
security mechanisms
computer security
real time
dynamic analysis
traffic analysis
program execution
chosen plaintext