Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach

Lokesh Jain, Aditya Chandran, Sanjay Rawat, Kannan Srinathan

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Original languageEnglish
Title of host publicationInternational Conference on Information Systems Security
Pages532-542
Number of pages11
Publication statusPublished - 2016

Cite this