-
1
Binary program taint analysis optimization method based on function summary
Published 2023-04-01Subjects: Get full text
Article -
2
Java deserialization gadget chain discovery method based on hybrid analysis
Published 2022-04-01Subjects: Get full text
Article -
3
Attack signature generation by traceable dynamic taint analysis
Published 2012-05-01Subjects: Get full text
Article -
4
-
5
Automatic exploitation generation method of write-what-where vulnerability
Published 2022-01-01Subjects: Get full text
Article