|
|
|
Kailong Zhu, Yuliang Lu, Hui Huang, Lu Yu and Jiazhen Zhao
Control Flow Graphs (CFGs) provide fundamental data for many program analyses, such as malware analysis, vulnerability detection, code similarity analysis, etc. Existing techniques for constructing control flow graphs include static, dynamic, and hybrid ...
ver más
|
|
|
|
|
|
|
Enze Wang, Baosheng Wang, Wei Xie, Zhenhua Wang, Zhenhao Luo and Tai Yue
At present, embedded devices have become a part of people?s lives, so detecting security vulnerabilities contained in devices becomes imperative. There are three challenges in detecting embedded device vulnerabilities: (1) Most network protocols are stat...
ver más
|
|
|
|