Exploitation of Thick Client Application Vulnerabilities and a Synopsis of Mitigation: *How to Conduct Attacks to Abuse Weaknesses Present in a Windows Executable File. | IEEE Conference Publication | IEEE Xplore
  Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]