Sign in

DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware.

Kai ChengQiang LiLei WangQian ChenYaowen ZhengLimin SunZhenkai Liang
Published in: DSN (2018)
Keyphrases
  • buffer overflow
  • operating system
  • power consumption
  • data sets
  • low cost
  • computer systems
  • control flow