共 50 条
- [2] Binary code execution path based on symbolic and actual program execution Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2186 - 2192
- [3] Similar Execution Path Generation Based on Backward Symbolic Analysis MODERN TENDENCIES IN ENGINEERING SCIENCES, 2014, 533 : 427 - 431
- [4] Source Code Assertion Verification Using Backward Symbolic Execution INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM-2018), 2019, 2116
- [6] Learning to Prune Infeasible Paths in Generalized Symbolic Execution 2022 IEEE 33RD INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2022), 2022, : 494 - 504
- [8] Symbolic Execution of Obfuscated Code CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 732 - 744
- [9] Detection of infeasible path in procedure Jisuanji Gongcheng/Computer Engineering, 2006, 32 (16): : 86 - 88
- [10] Detection of Unlink Attack Based on Symbolic Execution Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2018, 46 (08): : 81 - 87