You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,8 +18,8 @@ which actions to inject and when, based on the _runtime_ behaviour of the system
18
18
under test.
19
19
20
20
## Citing Mallory
21
-
Mallory has been accepted for publication at the 30th ACM Conference on Computer and Communications Security (CCS 2023).
22
-
21
+
Mallory has been accepted for publication at the 30th ACM Conference on Computer and Communications Security (CCS 2023).
22
+
The paper is also available on [arXiv](https://arxiv.org/pdf/2305.02601.pdf). If you use this code in your scientific work, please cite the paper as follows:
23
23
```
24
24
@inproceedings{mallory,
25
25
author={Ruijie Meng, George P{\^i}rlea, Abhik Roychoudhury and Ilya Sergey},
0 commit comments