Cited By
View all- Wen ZZhou JPan MWang SHu XXu TZhang TLi XChristakis MPradel M(2024)Silent Taint-Style Vulnerability Fixes IdentificationProceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis10.1145/3650212.3652139(428-439)Online publication date: 11-Sep-2024
- Lounis AAndreoli ADebbabi MHanna A(2024)Seum Spread: Discerning Security Flaws in IoT Firmware via Call Sequence SemanticsDetection of Intrusions and Malware, and Vulnerability Assessment10.1007/978-3-031-64171-8_21(395-415)Online publication date: 17-Jul-2024
- Gupta SGupta BChaudhary P(2020)Designing a XSS Defensive Framework for Web Servers Deployed in the Existing Smart City InfrastructureJournal of Organizational and End User Computing10.4018/JOEUC.202010010532:4(85-111)Online publication date: 1-Oct-2020
- Show More Cited By