Old Web
English
Sign In
Acemap
>
Paper
>
Approach ofgenerating vulnerability signature based on taint analysis and symbolic execution
Approach ofgenerating vulnerability signature based on taint analysis and symbolic execution
2016
Xin Wei
Shi Zhiwei
Hao yongle
Dong Guowei
Keywords:
Theoretical computer science
Database
Taint checking
Vulnerability
Symbolic execution
Computer science
Programming language
Correction
Source
Cite
Save
Machine Reading By IdeaReader
0
References
0
Citations
NaN
KQI
[]