1. Statistics of revealed vulnerabilities of software cvedetails. https://www.cvedetails.com/browse-by-date.php. Cited May 14, 2023.
2. NIST Database of software vulnerabilities. https://nvd.nist.gov/vuln. Cited May 14, 2023.
3. Pavlenko, E.Yu. and Lemets, A.A., Etherium smart contracts security analysis, Probl. Inf. Bezopasnosti. Komp’yuternye Sist., 2019, no. 2, pp. 100–106.
4. Kaur, A. and Nayyar, R., A comparative study of static code analysis tools for vulnerability detection in C/C++ and Java source code, Procedia Comput. Sci., 2020, vol. 171, pp. 2023–2029. https://doi.org/10.1016/j.procs.2020.04.217
5. Borzacchiello, L., Coppa, E., and Demetrescu, C., FUZZOLIC: Mixing fuzzing and concolic execution, Comput. Secur., 2021, vol. 108, p. 102368. https://doi.org/10.1016/j.cose.2021.102368