A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Survey of Automated Vulnerability Detection and Exploit Generation Techniques in Cyber Reasoning Systems
[article]
2018
arXiv
pre-print
Software is everywhere, from mission critical systems such as industrial power stations, pacemakers and even household appliances. This growing dependence on technology and the increasing complexity software has serious security implications as it means we are potentially surrounded by software that contain exploitable vulnerabilities. These challenges have made binary analysis an important area of research in computer science and has emphasized the need for building automated analysis systems
arXiv:1702.06162v4
fatcat:3rhzbmq6yve2jkcx2mv73pjnre