Required features for taint-based vulnerability tools? [closed]
What tools are necessary for static-analysis taint-based vulnerability detection? For example, being able to find/search source-sink paths through a tainted variable, flexibility to choose flow sensitive/insensitive analysis, etc.
I realiz… Continue reading Required features for taint-based vulnerability tools? [closed]