<--- Back to Details
First PageDocument Content
Programming language theory / Symbolic execution / C / Type system / EXE / Pointer / Array data type / Portable Executable / Computing / Data types / Software engineering
Date: 2006-09-08 17:55:30
Programming language theory
Symbolic execution
C
Type system
EXE
Pointer
Array data type
Portable Executable
Computing
Data types
Software engineering

Add to Reading List

Source URL: www.stanford.edu

Download Document from Source Website

File Size: 1,00 MB

Share Document on Facebook

Similar Documents

Embedded systems / Computer hardware / Computing / USB / Electronics / Firmware / Intel MCS-51 / Microcontroller / Human interface device / Computer / USB human interface device class

arXiv:1708.09114v1 [cs.CR] 30 AugFirmUSB: Vetting USB Device Firmware using Domain Informed Symbolic Execution Grant Hernandez∗

DocID: 1xVC4 - View Document

Software engineering / Computer programming / Computing / Object-oriented programming languages / KeY / Symbolic execution / Thread / LLVM / Parallel computing / D / Concolic testing

Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw

DocID: 1xVzE - View Document

Software engineering / Computing / Computer programming / Cross-platform software / High-level programming languages / Abstract interpretation / Computer science / Symbolic execution / D / Pure / Concolic testing

Multi-Solver Support in Symbolic Execution Hristina Palikareva, Cristian Cadar SMT Workshop 2014, Vienna, 17 July 2014 Dynamic Symbolic Execution

DocID: 1xV4A - View Document

Symbol

Symbolic Execution for a Clash-Free Subset of ASMs ? Gerhard Schellhorna , Gidon Ernsta , J¨org Pf¨ahlera , Stefan Bodenm¨ ullera , a Wolfgang Reif a Institute

DocID: 1xU5v - View Document

Symbolic execution for BIOS security1 Oleksandr Bazhaniuk, John Loucaides, Lee Rosenbaum, Mark R. Tuttle, Vincent Zimmer2 Intel Corporation May 25, 2015 Abstract We are building a tool that uses symbolic execution to

DocID: 1viNk - View Document