|
|
|
Zehan Chen, Yuliang Lu, Kailong Zhu, Lu Yu and Jiazhen Zhao
Fuzzing is one of the most successful software testing techniques used to discover vulnerabilities in programs. Without seeds that fit the input format, existing runtime dependency recognition strategies are limited by incompleteness and high overhead. I...
ver más
|
|
|
|
|
|
|
Kailong Zhu, Yuliang Lu, Hui Huang, Lu Yu and Jiazhen Zhao
Control Flow Graphs (CFGs) provide fundamental data for many program analyses, such as malware analysis, vulnerability detection, code similarity analysis, etc. Existing techniques for constructing control flow graphs include static, dynamic, and hybrid ...
ver más
|
|
|
|