Return to Article Details Analysis of the Control Flow Graph to Detect Attacks at the Application by Verification its System Calls Download Download PDF