Login / Signup
Exploiting the Trust Between Boundaries: Discovering Memory Corruptions in Printers via Driver-Assisted Testing.
Xiaoyu He
Erick Bauman
Feng Li
Lei Yu
Linyu Li
Bingchang Liu
Aihua Piao
Kevin W. Hamlen
Wei Huo
Wei Zou
Published in:
LCTES (2020)
Keyphrases
</>
trust model
memory usage
data sets
trust evaluation
software testing
database
data mining
virtual teams
object boundaries
virtual communities
dangerous situations
memory size
memory space
computational power
memory requirements
test data
test cases
software engineering
real time