1. Automatic exploit generation
2. Roberto Baldoni , Emilio Coppa , Daniele Cono D’elia , Camil Demetrescu, and Irene Finocchi. 2018 . A Survey of Symbolic Execution Techniques. ACM Comput. Surv., 51, 3 (2018), Article 50, 39 pages. issn:0360-0300 Roberto Baldoni, Emilio Coppa, Daniele Cono D’elia, Camil Demetrescu, and Irene Finocchi. 2018. A Survey of Symbolic Execution Techniques. ACM Comput. Surv., 51, 3 (2018), Article 50, 39 pages. issn:0360-0300
3. Running symbolic execution forever
4. Juan Caballero and Zhiqiang Lin . 2016. Type Inference on Executables. ACM Comput. Surv., 48, 4 ( 2016 ), Article 65, 35 pages. issn:0360-0300 Juan Caballero and Zhiqiang Lin. 2016. Type Inference on Executables. ACM Comput. Surv., 48, 4 (2016), Article 65, 35 pages. issn:0360-0300
5. Cristian Cadar , Daniel Dunbar , and Dawson Engler . 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs . In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. 209–224 . Cristian Cadar, Daniel Dunbar, and Dawson Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. 209–224.