Pengbin Feng

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
As one of the most prominent threat, information leakages usually take sensitive data from some private sources and improperly release the data through malicious or misused method invocations and intercommunications. As a countermeasure against this threat, a number of detection approaches have been developed based on static analysis, esp. taint analysis.(More)
  • 1