1. Sutton, M., Greene, A., and Amini, P. Fuzzing: Brute Force Vulnerability Discovery, Addison--Wesley Professional, United States, 2007.
2. Schwartz, E.J., Avgerinos, T., and Brumley, D. "All you ever wanted to know about dynamic taint analysis and forward symbolic execution", In IEEE Symposium on Security and Privacy, IEEE Computer Society, 2010, pp. 317--331.
3. RFC 5280- Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
4. RFC 5246- Transport Layer Security Protocol Version 1.2
5. Citrix NetScaler- https://www.citrix.com/content/dam/citrix/en_us/documents/products-solutions/citrix-netscaler-application-delivery-controller-at-a-glance.pdf as accessed in June 2016.