Login / Signup

Breaking and Fixing Destructive Code Read Defenses.

Jannik PewnyPhilipp KoppeLucas DaviThorsten Holz
Published in: ACSAC (2017)
Keyphrases
  • source code
  • network security
  • real time
  • data flow
  • data sets
  • error correcting
  • machine learning systems
  • neural network
  • real world
  • anomaly detection
  • error detection
  • fully functional