1. Alhuzali, A., Eshete, B., Gjomemo, R., Venkatakrishnan, V.: Chainsaw: Chained automated workflow-based exploit generation. In: ACM Conf. on Computer and Communications Security, pp. 641–652 (2016)
2. Alon, U., Brody, S., Levy, O., Yahav, E.: code2seq: Generating sequences from structured representations of code. In: Intl. Conf. on Learning Representations (2018)
3. Anley, C., Heasman, J., Lindner, F., Richarte, G.: The Shellcoder’s Handbook: Discovering and Exploiting Security Holes. Wiley (2007). https://books.google.it/books?id=8PLYwAEACAAJ
4. Arce, I.: The shellcode generation. IEEE Security & Privacy 2(5), 72–76 (2004)
5. Avgerinos, T., Cha, S.K., Hao, B.L.T., Brumley, D.: Aeg: Automatic exploit generation. In: NDSS (2011)