Replacement attacks: automatically evading behavior-based software birthmark.
Zhi XinHuiyu ChenXinche WangPeng LiuSencun ZhuBing MaoLi XiePublished in: Int. J. Inf. Sec. (2012)
Keyphrases
- dynamic analysis
- computer systems
- user interface
- software tools
- computer security
- automatically generated
- software systems
- software development
- software architecture
- software developers
- static analysis
- software package
- open source
- database
- source code
- hardware design
- security risks
- automated tools
- security vulnerabilities