Abstract
In the current cyberspace, vulnerability has attracted the widespread attention. This paper briefly introduces the typical software vulnerability mining techniques. Based on the existing research work, this paper puts forward the whole idea of the research on the vulnerability mining technology of software in the future, and then makes some research on some key points and key technologies respectively. In this paper, a brief study of the software vulnerability mining technology is given, which is helpful to carry out the follow-up research work.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.