Login / Signup
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
Run Wang
Pei Liu
Lei Zhao
Yueqiang Cheng
Lina Wang
Published in:
J. Syst. Softw. (2017)
Keyphrases
</>
input data
data sets
image data
main memory
memory usage
evolutionary algorithm
higher level
levels of abstraction
feature extraction
input space
non binary
computing power