Sign in

Malware Analysis with Symbolic Execution and Graph Kernel.

Charles-Henry Bertrand Van OuytselAxel Legay
Published in: CoRR (2022)
Keyphrases
  • static analysis
  • symbolic execution
  • data sets
  • databases
  • case study
  • data model
  • source code
  • error rate