作者: Zhi Wang , Jiang Ming , Chunfu Jia , Debin Gao
DOI: 10.1007/978-3-642-23822-2_12
关键词:
摘要: … binaries [12,28,40,2]. Brumley et al. proposed MineSweeper [3] that utilizes static analysis and symbolic execution … ger overflow vulnerability in x86 binary using symbolic execution. In: …