Precise and Effective Gadget Chain Mining through Deserialization Guided Call Graph Construction

Yiheng Zhang

34th USENIX Security Symposium (USENIX Security '25) · Day 2 · Software Security and Usable Security