“…In such attacks, the attacker constructs an input string in such a way that the underlying semantics of the interpretation is changed. The CSPS, and more importantly its implementations in solvers [38,1,16,36,37,25,35] have provided the much needed power to model and verify programs for such vulnerabilities. This in turn has directed the study to explore the boundaries of solvability.…”