Inproceedings,

Locating vulnerabilities in binaries via memory layout recovering.

, , , , , , , and .
ESEC/SIGSOFT FSE, page 718-728. ACM, (2019)

Meta data

Tags

Users

  • @dblp

Comments and Reviews