We describe a novel software verification primitive called … implicit representation of a hash value based on … of the code. … [p. 406] hashing assignments and control flows captures most … Using the comma operator [of C] and a temporary … [syntactic] transformation lets us intercept the value of assignment, and at … [p. 410] [For example,] Prior to shipping a protected application, … run the given function on the specified inputs, …
Google-1
Google-2
Copyright clearance needed for quotation.