Cited By
View all- Zeng YSong ZLv GZhou YZhu HSun L(2025)Backsolver: Adapting Preceding Execution Paths to Solve Constraints for Concolic ExecutionACM Transactions on Software Engineering and Methodology10.1145/371219434:3(1-30)Online publication date: 16-Jan-2025
- Vouvoutsis VCasino FPatsakis C(2025)Beyond the sandbox: Leveraging symbolic execution for evasive malware classificationComputers & Security10.1016/j.cose.2024.104193149(104193)Online publication date: Feb-2025
- Alshmrany KAldughaim MBhayat ACordeiro L(2024)FuSeBMC v4: Improving Code Coverage with Smart Seeds via BMC, Fuzzing and Static AnalysisFormal Aspects of Computing10.1145/366533736:2(1-25)Online publication date: 20-May-2024
- Show More Cited By