Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach

Lokesh Jain, Aditya Chandran, Sanjay Rawat, Kannan Srinathan. Discovering Vulnerable Functions by Extrapolation: A Control-Flow Graph Similarity Based Approach. In Indrajit Ray, Manoj Singh Gaur, Mauro Conti, Dheeraj Sanghi, V. Kamakoti, editors, Information Systems Security - 12th International Conference, ICISS 2016, Jaipur, India, December 16-20, 2016, Proceedings. Volume 10063 of Lecture Notes in Computer Science, pages 532-542, Springer, 2016. [doi]

Abstract

Abstract is missing.