8.28 Cross-Architecture Bug Search in Binary Executables
Previous8.27 Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary FirmwareNext8.29 Dynamic Hooks: Hiding Control Flow Changes within Non-Control Data
Last updated
Was this helpful?