Presentation Information
[A-7-09]Policy Generation Method for Backdoor Inspection using Data-Flow/Control-Flow Analysis
○Daiki Tanaka1, Yusuke Shimada1, Shunichi Kinoshita1 (1. NEC Corporation)
Keywords:
Software supply chain,Backdoor,Program analysis,Vulnerability