Sound & Efficient Generation of DOP Exploits via Programming Language Synthesis [pdf]



Login to add comment