Sign in

deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.

Run WangPei LiuLei ZhaoYueqiang ChengLina Wang
Published in: J. Syst. Softw. (2017)
Keyphrases
  • input data
  • data sets
  • image data
  • main memory
  • memory usage
  • evolutionary algorithm
  • higher level
  • levels of abstraction
  • feature extraction
  • input space
  • non binary
  • computing power