Login / Signup
Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities.
Gouayon Koala
Didier Bassolé
Télesphore Tiendrébéogo
Oumarou Sié
Published in:
InterSol (2022)
Keyphrases
</>
execution traces
statistical analysis
static analysis
object detection
databases
data model
source code
detection algorithm
computer programs