Papers tagged software security Composite Constant Propagation: Application to Android Inter-Procedural Dead Code Elimination The New Threat: passive online attacks against PKCS#11 devices Browse All Keywords By Category