Mechanical Phish: Resilient Autonomous Hacking.

IEEE Security & Privacy(2018)

引用 20|浏览146
暂无评分
摘要
The size and complexity of software is increasing, and security flaws are becoming more numerous, sophisticated, and impactful. While the vulnerability identification process (especially in hard-to-analyze binary programs) has traditionally been driven by highly skilled human analysts, this approach does not scale, given the vast amount of deployed software. Recently, the vulnerability analysis pr...
更多
查看译文
关键词
Computer security,Linux,Computer crashes,Computer hacking,Computer crime,Autonomous systems,Phishing
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要