Login / Signup
A methodology for finding source-level vulnerabilities of the Linux kernel variables.
Jaekwang Kim
Jee-Hyong Lee
Published in:
IJCNN (2008)
Keyphrases
</>
linux kernel
operating system
source code
levels of abstraction
real world
information security
clone detection
database
decision making
reinforcement learning
higher level
building blocks
intrusion detection
software systems
causal relationships