Title: GitHub - SoftwareSecurityLab/UbSym: A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Open Graph Title: GitHub - SoftwareSecurityLab/UbSym: A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
X Title: GitHub - SoftwareSecurityLab/UbSym: A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes
Description: A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes - SoftwareSecurityLab/UbSym
Open Graph Description: A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes - SoftwareSecurityLab/UbSym
X Description: A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes - SoftwareSecurityLab/UbSym
Opengraph URL: https://github.com/SoftwareSecurityLab/UbSym
X: @github
Domain: patch-diff.githubusercontent.com
| route-pattern | /:user_id/:repository |
| route-controller | files |
| route-action | disambiguate |
| fetch-nonce | v2:c3fc3c68-28ff-2156-653d-438c6369a70f |
| current-catalog-service-hash | f3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb |
| request-id | AF58:15F881:A8C399D:E11E509:696E3420 |
| html-safe-nonce | 66fcd4485c1faf5fe5a91d538bd39e58466c38d58cfa9fedc4350791be951574 |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJBRjU4OjE1Rjg4MTpBOEMzOTlEOkUxMUU1MDk6Njk2RTM0MjAiLCJ2aXNpdG9yX2lkIjoiNDk2MTIwNjg4MTAzNjk0MDMyMCIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9 |
| visitor-hmac | b08497d65a440e30cb69b6ad7dbf5391508fc480ea3bdd2f42a8af5663be14c8 |
| hovercard-subject-tag | repository:543304331 |
| github-keyboard-shortcuts | repository,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/SoftwareSecurityLab/UbSym |
| twitter:image | https://opengraph.githubassets.com/ef48a5d231612472d358cad301843f90a1878faa63cdeba79bce35a6fdac7986/SoftwareSecurityLab/UbSym |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/ef48a5d231612472d358cad301843f90a1878faa63cdeba79bce35a6fdac7986/SoftwareSecurityLab/UbSym |
| og:image:alt | A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes - SoftwareSecurityLab/UbSym |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| hostname | github.com |
| expected-hostname | github.com |
| None | b39958d54b39d52b9fc890ff25687d2383a83e003512d4480499b2dbd046839f |
| turbo-cache-control | no-preview |
| go-import | github.com/SoftwareSecurityLab/UbSym git https://github.com/SoftwareSecurityLab/UbSym.git |
| octolytics-dimension-user_id | 83138598 |
| octolytics-dimension-user_login | SoftwareSecurityLab |
| octolytics-dimension-repository_id | 543304331 |
| octolytics-dimension-repository_nwo | SoftwareSecurityLab/UbSym |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | false |
| octolytics-dimension-repository_network_root_id | 543304331 |
| octolytics-dimension-repository_network_root_nwo | SoftwareSecurityLab/UbSym |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | fba10be4ea34590240b2f4a625fc807362c2d5b8 |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width