2 code implementations • 28 Feb 2019 • Michael D. Brown, Santosh Pande
In this paper, we challenge this idea and show through a variety of realistic debloating scenarios the flaws inherent to the gadget count reduction metric.
Cryptography and Security