If you turned in a solution in class, you already got credit for this assignment. Otherwise, answer the following and submit to the E30 box on Canvas.

Exercise 30

What is the benefit of concolic execution over symbolic execution? How does it compare in terms of soundness / completeness of vulnerability finding?