Login / Signup
Vulnerability-Based Backdoors: Threats from Two-step Trojans.
Kai Chen
Yingjun Zhang
Yifeng Lian
Published in:
SERE (2013)
Keyphrases
</>
post processing
buffer overflow
satisfiability problem
multi step
security vulnerabilities
learning algorithm
search engine
control system
sat solvers
risk assessment
countermeasures
security risks