paper reading 5
- VulHawk Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search
- SynthDB Synthesizing Database via Program Analysis for Security Testing of Web Applications
- Extrapolating Formal Analysis to Uncover Attacks in Bluetooth Passkey Entry Pairing
- Detecting Kernel Memory Leaks in Specialized Modules With Ownership Reasoning
- Translating C to Safer Rust