Sign in

DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries - (Extended Abstract).

Konstantin BöttingerClaudia Eckert
Published in: DIMVA (2016)
Keyphrases
  • database
  • extended abstract
  • source code
  • databases
  • active rules
  • information security
  • reverse engineering
  • control flow
  • machine learning
  • learning algorithm
  • case study
  • countermeasures
  • attack graphs