Login / Signup
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses.
Fang Yu
Muath Alkhalaf
Tevfik Bultan
Published in:
ASE (2009)
Keyphrases
</>
forward and backward
intermediate level
symbolic representation
greedy search
dynamic programming
data structure
state space
pattern matching
string matching
multi objective
dimensionality reduction
heuristic search
edit distance