Data flow and heap analysis with application to privilege escalation vulnerability scanning and software theft detection
2005 ◽
Vol 64
(5)
◽
pp. 407-417
Keyword(s):
Keyword(s):