1. K. Anand, M. Smithson, K. Elwazeer, A. Kotha, J. Gruen, N. Giles, and R. Barua. A compiler-level intermediate representation based binary analysis and rewriting system. InProc. of the 8th ACM Euro. Conf. on Comp. Sys. (EuroSys '13), pages 295--308, 2013.
2. G. Balakrishnan and T. Reps. WYSINWYX:What You See Is Not What You eXecute.ACM Trans. on Prog. Lang. and Sys., 32(6):1--84, 2010.
3. T. Bao, J. Burket, M. Woo, R. Turner, and D. Brumley. BYTEWEIGHT: Learning to Recognize Functions in Binary Code. InProc. of the 23rd USENIX Security Symposium, pages 845--860, 2014.
4. S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. Comprehensive Experimental Analyses of Automotive Attack Surfaces. InProc. of the 20th USENIX Security conference, pages 6--6, 2011.
5. C. Cifuentes and M. Van Emmerik. Recovery of jump table case statements from binary code. InProcs of the 7th Int. Workshop on Program Comprehension, pages 192--199, 1999.