Fluid Attacks logo
Login
Contact Us
Young hacker smiling
Zero false positives

Expert intelligence + effective automation

Contact logo Contact Us
GET A DEMO
Screen showing source code

Exploiting code graphs

Mining graph representations for vulnerabilities
How to exploit graph representations of code in order to find security vulnerabilites. We introduce Yamaguchi's concept of code property graphs, which combines standard graph representations, how to traverse them, and how to guide a computer to traverse it on its own.
User icon Rafael Ballestas
Folder icon machine learning
Calendar icon

2018-11-27




Author picture

Rafael Ballestas



Related




Service status - Terms of Use