Login / Signup

On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.

Jedidiah R. CrandallZhendong SuShyhtsun Felix WuFrederic T. Chong
Published in: CCS (2005)
Keyphrases