to verify a particular
property, (2) try to automatically prove
the property, and in case of unknown status (
the proof failed...) search path conditions to violate
the property. Such violations may reveal vulnerabilities to be exploited by malicious input... -
Voir cette offre d'emploi