Login / Signup

Extracting and verifying cryptographic models from C protocol code by symbolic execution.

Mihhail AizatulinAndrew D. GordonJan Jürjens
Published in: CCS (2011)
Keyphrases
  • symbolic execution
  • static analysis
  • neural network
  • cryptographic protocols
  • test data generation
  • data sets
  • genetic algorithm
  • database systems