Presentation Information

[A-7-09]Policy Generation Method for Backdoor Inspection using Data-Flow/Control-Flow Analysis

○Daiki Tanaka1, Yusuke Shimada1, Shunichi Kinoshita1 (1. NEC Corporation)
PDF DownloadDownload PDF

Keywords:

Software supply chain,Backdoor,Program analysis,Vulnerability