Login / Signup

Vulnerability-Based Backdoors: Threats from Two-step Trojans.

Kai ChenYingjun ZhangYifeng Lian
Published in: SERE (2013)
Keyphrases
  • post processing
  • buffer overflow
  • satisfiability problem
  • multi step
  • security vulnerabilities
  • learning algorithm
  • search engine
  • control system
  • sat solvers
  • risk assessment
  • countermeasures
  • security risks