no code implementations • 1 Jun 2017 • Bhargava Shastry, Federico Maggi, Fabian Yamaguchi, Konrad Rieck, Jean-Pierre Seifert
In this paper, we use static template matching to find recurrences of fuzzer-discovered vulnerabilities.
Cryptography and Security Programming Languages Software Engineering