Login / Signup

Discovering Vulnerable Functions: A Code Similarity Based Approach.

Aditya ChandranLokesh JainSanjay RawatKannan Srinathan
Published in: SSCC (2016)
Keyphrases