Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths

0ae28f6d917d7810b9117e915bf3ded3?s=47 Xiaokui Shu
October 13, 2015

Unearthing Stealthy Program Attacks Buried in Extremely Long Execution Paths

Slides for my CCS '15 paper (same title).

0ae28f6d917d7810b9117e915bf3ded3?s=128

Xiaokui Shu

October 13, 2015
Tweet