• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Vulnerability-Based Backdoors: Threats from Two-step Trojans.

Kai ChenYingjun ZhangYifeng Lian
Published in: SERE (2013)
Keyphrases
  • post processing
  • buffer overflow
  • satisfiability problem
  • multi step
  • security vulnerabilities
  • learning algorithm
  • search engine
  • control system
  • sat solvers
  • risk assessment
  • countermeasures
  • security risks