1. Saswat Anand , Patrice Godefroid , and Nikolai Tillmann . 2008. Demand-driven compositional symbolic execution . In Tools and Algorithms for the Construction and Analysis of Systems (TACAS) . Springer , 367--381. Saswat Anand, Patrice Godefroid, and Nikolai Tillmann. 2008. Demand-driven compositional symbolic execution. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS). Springer, 367--381.
2. REDQUEEN: Fuzzing with Input-to-State Correspondence;Aschermann Cornelius;Network and Distributed Systems Security (NDSS),2019
3. Automatic exploit generation
4. Roberto Baldoni , Emilio Coppa , Daniele Cono D'elia , Camil Demetrescu , and Irene Finocchi . 2018 . A Survey of Symbolic Execution Techniques . Comput. Surveys , Vol. 51 , 3, Article 50 (may 2018), 39 pages. https://doi.org/ 10 .1145/3182657 10.1145/3182657 Roberto Baldoni, Emilio Coppa, Daniele Cono D'elia, Camil Demetrescu, and Irene Finocchi. 2018. A Survey of Symbolic Execution Techniques. Comput. Surveys, Vol. 51, 3, Article 50 (may 2018), 39 pages. https://doi.org/10.1145/3182657
5. Julian Bangert , Sergey Bratus , Rebecca Shapiro , and Sean W. Smith . 2013 . The Page-Fault Weird Machine: Lessons in Instruction-less Computation. In Workshop on Offensive Technologies (WOOT). USENIX. Julian Bangert, Sergey Bratus, Rebecca Shapiro, and Sean W. Smith. 2013. The Page-Fault Weird Machine: Lessons in Instruction-less Computation. In Workshop on Offensive Technologies (WOOT). USENIX.