Sign in

Detecting concurrency memory corruption vulnerabilities.

Yan CaiBiyun ZhuRuijie MengHao YunLiang HePurui SuBin Liang
Published in: ESEC/SIGSOFT FSE (2019)
Keyphrases