Login / Signup

Automated detection of vulnerabilities in privileged programs by execution monitoring.

Calvin KoGeorge FinkKarl N. Levitt
Published in: ACSAC (1994)
Keyphrases