Login / Signup
RICH: Automatically Protecting Against Integer-Based Vulnerabilities.
David Brumley
Dawn Xiaodong Song
Tzi-cker Chiueh
Rob Johnson
Huijia Lin
Published in:
NDSS (2007)
Keyphrases
</>
real world
neural network
information security
database
genetic algorithm
decision trees
access control
floating point
integer valued