Login / Signup
Input-Driven Dynamic Program Debloating for Code-Reuse Attack Mitigation.
Xiaoke Wang
Tao Hui
Lei Zhao
Yueqiang Cheng
Published in:
ESEC/SIGSOFT FSE (2023)
Keyphrases
</>
input data
computer programs
dynamic environments
test cases
genetic algorithm
data driven
intrusion detection
countermeasures