Login / Signup
Augmenting vulnerability analysis of binary code.
Sean Heelan
Agustin Gianni
Published in:
ACSAC (2012)
Keyphrases
</>
binary codes
hamming distance
gray code
similarity search
hash functions
image collections
data sets
pairwise
low dimensional
high dimensional data
neural network
image processing
pattern matching