


default search action
"A large-scale empirical analysis of the vulnerabilities introduced by ..."
Binbin Zhao et al. (2022)
- Binbin Zhao, Shouling Ji, Jiacheng Xu
, Yuan Tian, Qiuyang Wei
, Qinying Wang
, Chenyang Lyu, Xuhong Zhang, Changting Lin, Jingzheng Wu, Raheem Beyah:
A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware. ISSTA 2022: 442-454

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.