Sort by
Refine Your Search
-
changes either at the hardware or software levels, such that the target system reaches unexpected states or follows unexpected execution paths. Reaching such unexpected states is then leveraged in attacks
Searches related to software verification
Enter an email to receive alerts for software-verification positions