Login / Signup

Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks.

Mark FosterJoseph N. WilsonShigang Chen
Published in: ISC (2004)
Keyphrases