Keyphrases
Symbolic Execution
71%
Binary Codes
45%
Java
39%
Vulnerability
38%
Rangers
28%
Caching
27%
Quantitative Information Flow
27%
Malware
24%
Software Components
24%
Emulator
24%
Dynamic Binary Translation
24%
Security Applications
22%
Attacker
20%
Control Flow
19%
Model Counting
19%
Flow Capacity
19%
Component Behavior
19%
Bit Vector
19%
Vector Model
19%
Adapter
19%
Maximum Flow
19%
Network Flow
19%
Object Code
19%
Branch Coverage
19%
Source Code
19%
Static Analysis
17%
Dynamic Analysis
16%
Cross-ISA
14%
Flow Regions
13%
Cache Line
13%
Program Execution
13%
String Operation
12%
Function Pointer
12%
Untrusted
12%
JavaScript
12%
C + +
12%
Binary Programming
12%
Code Coverage
12%
Reverse Engineering
12%
Coverage Criteria
12%
Whole Systems
12%
Malware Sample
11%
Path Splitting
11%
Microarchitecture
11%
Binary Executables
11%
Cache Side-channel Attacks
11%
Daikon
11%
Veritesting
10%
C Library
10%
Automatically Identify
10%
Computer Science
Symbolic Execution
100%
Case Study
44%
Control Flow
43%
Software Component
38%
Malware
28%
Attackers
24%
Dynamic Binary Translation
24%
Program Execution
21%
Static Program Analysis
21%
Security Application
21%
Source Codes
20%
Branch Coverage
19%
Lines of Code
19%
C Program
19%
Coverage Criterion
19%
Security Policy
19%
Data Structure
19%
Bit Vector
19%
False Positive
19%
Formal Specification
19%
System Behavior
19%
Security Properties
19%
Experimental Result
18%
Dynamic Analysis
16%
Program Analysis
15%
Linux
15%
Bytecode
14%
Software Systems
14%
side-channel
14%
Search Space
12%
String Operation
12%
Reverse Engineering
12%
Function Pointer
12%
Decision Procedure
12%
Malware Sample
11%
System Security
10%
Code Reuse
10%
Execution Path
10%
Denial-of-Service
10%
Computer Architecture
9%
Error Handling
9%
Control-Flow Graph
9%
And-States
9%
Caching Framework
9%
Sensitive Application
9%
Javascript Code
9%
Code Module
9%
Dynamic Heap Allocation
9%
System Dynamics
9%
Channel Capacity
9%