1
Table of Contents:
“...: a platform to detect stealth attacks -- Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality -- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing -- On the Security Cost of Using a Free and Open Source Component in a...”
Full text
Full text