C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration.
Ruipeng Wang
Kaixiang Chen
Zulie Pan
Yuwei Li
Qianyu Li
Yang Li
Min Zhang
Chao Zhang
Published in:
Comput. Secur. (2023)
Keyphrases
</>
buffer overflow
security policies
control flow
information security
security vulnerabilities
active exploration
active learning
state variables
mobile robot
access control
search strategies
state transition
initial state
security problems