Login / Signup

Uncovering access control weaknesses and flaws with security-discordant software clones.

François GauthierThierry LavoieEttore Merlo
Published in: ACSAC (2013)
Keyphrases