Login / Signup
Extracting and verifying cryptographic models from C protocol code by symbolic execution.
Mihhail Aizatulin
Andrew D. Gordon
Jan Jürjens
Published in:
CCS (2011)
Keyphrases
</>
symbolic execution
static analysis
neural network
cryptographic protocols
test data generation
data sets
genetic algorithm
database systems