Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
458844 | Infosecurity | 2007 | 4 Pages |
Abstract
August's Black Hat event heard that zero-day vulnerabilities can be reverse-engineered. Cath Everett assesses the damage
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Cath Everett,