Sign in

Search-driven string constraint solving for vulnerability detection.

Julian ThoméLwin Khin SharDomenico BianculliLionel C. Briand
Published in: ICSE (2017)
Keyphrases