1. Control-flow integrity;Abadi,2005
2. Demand-driven compositional symbolic execution;Anand,2008
3. Address obfuscation: an efficient approach to combat a broad range of memory error exploits;Bhatkar,2003
4. EXE: automatically generating inputs of death;Cadar,2006
5. KLEE: unassisted and automatic generation of high-coverage tests for complex system programs;Cadar,2008