Introduction Automata Manipulations Symbolic String Vulnerability Analysis Composite String Analysis Implementation and Summary
Verification of String Manipulating Programs
Fang Yu
Software Security Lab. Department of Management Information Systems College of Commerce, National Chengchi University http://soslab.nccu.edu.tw
FLOLAC, July 6, 2011
1 / 138