Revision history of "AppSecEU08 The Dynamic Taint Propagation Finding Vulnerabilities Without Attacking"

Jump to: navigation, search

Diff selection: Mark the radio boxes of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

  • (cur | prev) 10:48, 29 April 2008Mmadou (Talk | contribs). . (1,412 bytes) (+1,412). . (New page: The purpose of this talk is to demonstrate a new technique for finding security vulnerabilities. This technique analyzes the flow of data throughout an application and identifies vulnerabl...)