1. Lecture Notes in Computer Science;L Al Sardy,2019
2. Lecture Notes in Computer Science;L Al Sardy,2018
3. Baldoni, R., Coppa, E., D’Elia, D., Demetrescu, C., Finocchi, I.: A survey of symbolic execution techniques. ACM Comput. Surv. 51(3), 1–39 (2018)
4. Cadar, C., Dunbar, D., Engler, D.: KLEE: unassisted and automatic generation of high-coverage tests for complex system programs. In: USENIX Symposium on Operating Systems Design and Implementation, pp. 209–224. USENIX Association (2008)
5. Cisco: Most common CWE vulnerabilities. Annual Cybersecurity Report (2018)