Keyphrases
Adapter
19%
Attacker
20%
Automatically Identify
10%
Binary Codes
47%
Binary Executables
11%
Binary Programming
12%
Bit Vector
19%
Branch Coverage
19%
C + +
12%
C Library
10%
Cache Line
13%
Cache Side-channel Attacks
11%
Caching
28%
Code Coverage
12%
Component Behavior
19%
Control Flow
20%
Coverage Criteria
12%
Cross-ISA
14%
Daikon
11%
Dynamic Analysis
16%
Dynamic Binary Translation
24%
Emulator
24%
Flow Capacity
19%
Flow Regions
14%
Function Pointer
13%
Java
40%
JavaScript
12%
Malware
25%
Malware Sample
12%
Maximum Flow
19%
Microarchitecture
11%
Model Counting
19%
Network Flow
19%
Object Code
19%
Path Splitting
11%
Program Execution
13%
Quantitative Information Flow
28%
Rangers
29%
Reverse Engineering
12%
Security Applications
23%
Software Components
24%
Source Code
19%
Static Analysis
17%
String Operation
13%
Symbolic Execution
73%
Untrusted
13%
Vector Model
19%
Veritesting
11%
Vulnerability
39%
Whole Systems
12%
Computer Science
And-States
9%
Attackers
25%
Bit Vector
19%
Branch Coverage
19%
Bytecode
15%
C Program
19%
Caching Framework
9%
Case Study
45%
Channel Capacity
9%
Code Module
9%
Code Reuse
11%
Computer Architecture
10%
Computer Hardware
30%
Control Flow
44%
Control-Flow Graph
9%
Coverage Criterion
19%
Data Structure
19%
Decision Procedure
12%
Dynamic Analysis
17%
Dynamic Binary Translation
24%
Dynamic Heap Allocation
9%
Error Handling
9%
Execution Path
10%
Experimental Result
19%
False Positive
19%
Formal Specification
19%
Function Pointer
12%
Javascript Code
9%
Lines of Code
19%
Linux
15%
Malware
29%
Malware Sample
11%
Probabilistic Inference
9%
Program Analysis
16%
Program Execution
22%
Search Space
9%
Security Application
22%
Security Policy
19%
Security Properties
19%
Sensitive Application
9%
side-channel
14%
Software Component
39%
Software Systems
14%
Source Codes
20%
Static Program Analysis
22%
String Operation
13%
Symbolic Execution
100%
System Behavior
19%
System Dynamics
9%
System Security
11%