The application of formal methods to the reverse engineering of imperative program code

Full text