diff --git a/lectures/SonarGuestLecture-2022-11-28.pdf b/lectures/SonarGuestLecture-2022-11-28.pdf new file mode 100644 index 0000000000000000000000000000000000000000..4eadab8e984cdbae036fff24a417696f65811f86 Binary files /dev/null and b/lectures/SonarGuestLecture-2022-11-28.pdf differ diff --git a/lectures/sonar.md b/lectures/sonar.md index 6010073b19c676ae8bb117b55e13566610e8319c..5ea81c142351e418e37c38d0504fe6da054badef 100644 --- a/lectures/sonar.md +++ b/lectures/sonar.md @@ -2,3 +2,4 @@ Compiler technology enables a deep understanding of source code that is useful beyond producing an executable. In this lecture, we will introduce static analysis that powers tools detecting bugs and vulnerabilities in your code. We will present several techniques: AST-based analysis, taint analysis, and symbolic execution. We will demonstrate how static analysis can be implemented for Amy language. + * [Slides](./SonarGuestLecture-2022-11-28.pdf) \ No newline at end of file