Tags binary security3 c/c++3 code reading6 code search1 compiler optimization1 concolic execution1 devops1 excel1 exploitation1 formal method1 git1 json1 open source1 OS kernel3 paper reading5 plan1 program analysis16 request1 reverse engineering2 rust2 vulnerability1