Login / Signup
DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware.
Kai Cheng
Qiang Li
Lei Wang
Qian Chen
Yaowen Zheng
Limin Sun
Zhenkai Liang
Published in:
DSN (2018)
Keyphrases
</>
buffer overflow
operating system
power consumption
data sets
low cost
computer systems
control flow