1. A determined algorithm of code analysis of commodity software;Arzamartsev;IT Security (National Research Nuclear University MEPhI (Moscow Engineering Physics Institute), Moscow, Russian Federation),2013
2. Analyzing memory accesses in x86 executables;Balakrishnan,2004
3. Baldoni, R., Coppa, E., Cono D’Elia, D., Demetrescu, C., Finocchi, I., 2016. A Survey of Symbolic Execution Techniques. arXiv e-prints arXiv:1610.00502.
4. Cadar, C., Dunbar, D., Engler, D., 2008. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs, in: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, USENIX Association, Berkeley, CA, USA. pp. 209–224. URL: http://dl.acm.org/citation.cfm?id=1855741.1855756