Login / Signup

Study of an Approach Based on the Analysis of Computer Program Execution Traces for the Detection of Vulnerabilities.

Gouayon KoalaDidier BassoléTélesphore TiendrébéogoOumarou Sié
Published in: InterSol (2022)
Keyphrases
  • execution traces
  • statistical analysis
  • static analysis
  • object detection
  • databases
  • data model
  • source code
  • detection algorithm
  • computer programs