Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
25
views
10
references
Top references
cited by
4
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,241
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computer Aided Verification
The BINCOA Framework for Binary Code Analysis
other
Author(s):
Sébastien Bardin
,
Philippe Herrmann
,
Jérôme Leroux
,
Olivier Ly
,
Renaud Tabary
,
Aymeric Vincent
Publication date
(Print):
2011
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Core Readings in Statistical Mediation Analysis
Most cited references
10
Record
: found
Abstract
: not found
Book Chapter
: not found
Analyzing Memory Accesses in x86 Executables
Gogul Balakrishnan
,
Thomas Reps
(2004)
0
comments
Cited
16
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Refinement-Based CFG Reconstruction from Unstructured Programs
Sébastien Bardin
,
Philippe Herrmann
,
Franck Védrine
(2011)
0
comments
Cited
10
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
CodeSurfer/x86—A Platform for Analyzing x86 Executables
Gogul Balakrishnan
,
Radu Gruian
,
Thomas Reps
…
(2005)
0
comments
Cited
10
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2011
Pages
: 165-170
DOI:
10.1007/978-3-642-22110-1_13
SO-VID:
8aa3d47d-0d67-4dd0-ac47-a5446dd91c90
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
pp. 470
HMC: Verifying Functional Programs Using Abstract Interpreters
pp. 50
Stability in Weak Memory Models
pp. 99
Getting Rid of Store-Buffers in TSO Analysis
pp. 149
Resolution Proofs and Skolem Functions in QBF Evaluation and Applications
pp. 165
The BINCOA Framework for Binary Code Analysis
pp. 171
CVC4
pp. 178
SLAyer: Memory Safety for Systems-Level Code
pp. 184
CPAchecker: A Tool for Configurable Software Verification
pp. 225
Model Checking Algorithms for CTMDPs
pp. 243
Quantitative Synthesis for Concurrent Programs
pp. 277
Smoothing a Program Soundly and Robustly
pp. 349
Time for Statistical Model Checking of Real-Time Systems
pp. 372
Predator: A Practical Tool for Checking Manipulation of Dynamic Data Structures Using Separation Logic
pp. 379
SpaceEx: Scalable Verification of Hybrid Systems
pp. 396
From Cardiac Cells to Genetic Regulatory Networks
pp. 412
Threader: A Constraint-Based Verifier for Multi-threaded Programs
pp. 457
μZ– An Efficient Engine for Fixed Points with Constraints
pp. 463
BAP: A Binary Analysis Platform
pp. 504
Bug-Assist: Assisting Fault Localization in ANSI-C Programs
pp. 526
Language Equivalence for Probabilistic Automata
pp. 573
Interpolation-Based Software Verification with Wolverine
pp. 585
PRISM 4.0: Verification of Probabilistic Real-Time Systems
pp. 592
Program Analysis for Overlaid Data Structures
pp. 609
KLOVER: A Symbolic Execution and Automatic Test Generation Tool for C++ Programs
pp. 663
Analyzing Unsynthesizable Specifications for High-Level Robot Behavior Using LTLMoP
pp. 669
Practical, Low-Effort Equivalence Verification of Real Code
pp. 686
Relational Abstractions for Continuous and Hybrid Systems
pp. 703
Simplifying Loop Invariant Generation Using Splitter Predicates
pp. 743
Model Checking Recursive Programs with Numeric Data Types
Similar content
3,241
Nickel(ii) complexes based on dithiolate–polyamine binary ligand systems: crystal structures, hirshfeld surface analysis, theoretical study, and catalytic activity study on photocatalytic hydrogen generation
Authors:
Suman Adhikari
,
Tirtha Bhattacharjee
,
Sharmila Bhattacharjee
…
The solar-type eclipsing binary system LL Aquarii
Authors:
J. Southworth
Quality enhancement of binary-encoded amplitude holograms by using error diffusion
Authors:
Kyosik Min
,
Jae-Hyeung Park
See all similar
Cited by
4
Recovering High-Level Conditions from Binary Programs
Authors:
Adel Djoudi
,
Sébastien Bardin
,
Eric Goubault
Targeting Infeasibility Questions on Obfuscated Codes
Authors:
Robin David
,
Sébastien Bardin
,
Jean-Yves Marion
Get rid of inline assembly through trustable verification-oriented lifting
Authors:
Frédéric Recoules
,
Sébastien Bardin
,
Richard Bonichon
…
See all cited by