Inproceedings,

Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach.

, , , and .
ICISS, volume 10063 of Lecture Notes in Computer Science, page 532-542. Springer, (2016)

Meta data

Tags

Users

  • @dblp

Comments and Reviews