This is the first existing book focusing on string analysis Discusses how string analysis techniques work and how they can be applied to vulnerability detection in modern software applications This book can be used as a textbook for a course on string analysis, or as a supplementary book for a course on vulnerability detection