Open kbroughton opened 6 years ago
I don't know of anyone working on this. At a high level the general approach (figure out where attacker-controlled data reaches in the program and then use that data to create bugs) should be applicable to Java or C#, but all of the machinery here is geared toward C/C++.
The basic ingredients are:
Could someone describe at a high level what would be required to support java or C#? Are you aware of anyone working on this?