Symbolic Security Predicates: Hunt Program Weaknesses | IEEE Conference Publication | IEEE Xplore