DMCA

Convicting Exploitable Software Vulnerabilities: An Efficient Input Provenance Based Approach

by Zhiqiang Lin , et al.
Citations:8 - 1 self