Exploitation of Thick Client Application Vulnerabilities and a Synopsis of Mitigation: *How to Conduct Attacks to Abuse Weaknesses Present in a Windows Executable File. | IEEE Conference Publication | IEEE Xplore
Location via proxy:
[ UP ]
[Report a bug]
[Manage cookies]
No cookies
No scripts
No ads
No referrer
Show this form