Integrating informal and formal techniques to reverse engineer imperative programs

Full text