Sign in

Detection of Security Vulnerabilities in C Code Using Runtime Verification: An Experience Report.

Kostyantyn VorobyovNikolai KosmatovJulien Signoles
Published in: TAP@STAF (2018)
Keyphrases
  • security vulnerabilities
  • intrusion detection
  • source code
  • anomaly detection
  • cloud computing
  • model checking
  • penetration testing
  • sql injection