1. Srcclone: Detecting code clones via decompositional slicing;Alomari,2020
2. Bao, T., Burket, J., Woo, M., Turner, R., Brumley, D., 2014. BYTEWEIGHT: learning to recognize functions in binary code. In: Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22. 2014, pp. 845–860.
3. Rwset: Attacking path explosion in constraint-based test generation;Boonstoppel,2008
4. Brumley, D., Poosankam, P., Song, D., Zheng, J., 2008. Automatic patch-based exploit generation is possible: Techniques and implications. In: 2008 IEEE Symposium on Security and Privacy (S & P 2008), 18-21 May 2008. Oakland, California, USA, pp. 143–157.
5. Caballero, J., Johnson, N., McCamant, S., Song, D., 2010. Binary code extraction and interface identification for security applications. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd 2010.