Abstract
To evaluate heap security, researchers have designed evaluation tools that automatically locate heap vulnerabilities. Most of these tools define heap ......
小提示:本篇文献需要登录阅读全文,点击跳转登录