Login / Signup
STING: Finding Name Resolution Vulnerabilities in Programs.
Hayawardh Vijayakumar
Joshua Schiffman
Trent Jaeger
Published in:
USENIX Security Symposium (2012)
Keyphrases
</>
information security
neural network
real time
information retrieval
e learning
image processing
data structure
information technology
object oriented
low resolution
countermeasures
security issues
fixpoint
automatic programming
method finds
security vulnerabilities