Login / Signup
A combinatorial approach to detecting buffer overflow vulnerabilities.
Wenhua Wang
Yu Lei
Donggang Liu
David Chenho Kung
Christoph Csallner
Dazhi Zhang
Raghu Kacker
Rick Kuhn
Published in:
DSN (2011)
Keyphrases
</>
buffer overflow
data corruption
security problems
rare events
information systems
active learning
importance sampling