1. Blazingtools perfect keylogger. http://www.blazingtools.com/bpk.html.
2. QEMU. http://www.qemu.org.
3. Tribal flood network. http://www.cert.org/incident_notes/IN-99-07.html.
4. David Brumley, Cody Hartwig, Min Gyang Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Dawn Song, and Heng Yin. Automatically dissecting malicious binaries. Technical Report CMU-CS-07-133, 2007.
5. David Brumley and James Newsome. Alias analysis for assembly. Technical Report CMU-CS-06-180, Carnegie Mellon University School of Computer Science, 2006.