Description: Mining history-oriented source code (Source Code) vulnerability has been quite long and has made significant progress
Show. However, for commercial interests, intellectual property protection and other reasons, the majority of software vendors to not provide the source
Procedures Although some manufacturers provide a source, but the correspondence between the source and the actual system is unable to experience
Card. In addition, source-level vulnerability analysis can not find the compile and link process introduced vulnerabilities. Therefore, direct
Access to the security vulnerabilities of the binary-oriented mining research is of great significance.
To Search:
File list (Check if you may need any files):
201111-172.pdf