Automatic Exploit Generation
Shih-Kun Huang
skhuang@cs.nctu.edu.tw
Information Technology Service Center
National Chiao Tung University
Text
By Shih-Kun Huang
Can symbolic execution be useful in CTF ?