Login / Signup
Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration.
Ruipeng Wang
Kaixiang Chen
Zulie Pan
Yuwei Li
Qianyu Li
Yang Li
Min Zhang
Chao Zhang
Published in:
Comput. Secur. (2023)
Keyphrases
</>
buffer overflow
security policies
control flow
information security
security vulnerabilities
active exploration
active learning
state variables
mobile robot
access control
search strategies
state transition
initial state
security problems