Login / Signup

Using Program Analysis to Identify the Use of Vulnerable Functions.

Rasmus HagbergMartin HellChristoph Reichenbach
Published in: SECRYPT (2021)
Keyphrases
  • data mining
  • information retrieval
  • database
  • information systems
  • decision making
  • image processing
  • search algorithm
  • upper bound
  • basis functions