Sign in

Locating vulnerabilities in binaries via memory layout recovering.

Haijun WangXiaofei XieShang-Wei LinYun LinYuekang LiShengchao QinYang LiuTing Liu
Published in: ESEC/SIGSOFT FSE (2019)
Keyphrases