Login / Signup
DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract).
Konstantin Böttinger
Claudia Eckert
Published in:
DIMVA (2016)
Keyphrases
</>
database
extended abstract
source code
databases
active rules
information security
reverse engineering
control flow
machine learning
learning algorithm
case study
countermeasures
attack graphs