Sign in

Input-Driven Dynamic Program Debloating for Code-Reuse Attack Mitigation.

Xiaoke WangTao HuiLei ZhaoYueqiang Cheng
Published in: ESEC/SIGSOFT FSE (2023)
Keyphrases
  • input data
  • computer programs
  • dynamic environments
  • test cases
  • genetic algorithm
  • data driven
  • intrusion detection
  • countermeasures