1. US National Security Agency. 2021. Ghidra. https://github.com/NationalSecurityAgency/ghidra (Accessed 08-11-2021). US National Security Agency. 2021. Ghidra. https://github.com/NationalSecurityAgency/ghidra (Accessed 08-11-2021).
2. Omer Akgul , Taha Eghtesad , Amit Elazari , Omprakash Gnawali , Jens Grossklags , Daniel Votipka , and Aron Laszka . 2020 . The Hackers’ Viewpoint: Exploring Challenges and Benefits of Bug-Bounty Programs. In 2020 Workshop on Security Information Workers(WSIW ’20) . USENIX Association, Virtual. https://wsiw 2020.sec.uni-hannover.de/downloads/WSIW2020-The%20Hackers%20Viewpoint.pdf Omer Akgul, Taha Eghtesad, Amit Elazari, Omprakash Gnawali, Jens Grossklags, Daniel Votipka, and Aron Laszka. 2020. The Hackers’ Viewpoint: Exploring Challenges and Benefits of Bug-Bounty Programs. In 2020 Workshop on Security Information Workers(WSIW ’20). USENIX Association, Virtual. https://wsiw2020.sec.uni-hannover.de/downloads/WSIW2020-The%20Hackers%20Viewpoint.pdf
3. Miltiadis Allamanis , Earl T. Barr , Christian Bird , and Charles Sutton . 2015 . Suggesting Accurate Method and Class Names. In 2015 Joint Meeting on Foundations of Software Engineering ( Bergamo, Italy) (ESEC/FSE ’15). Association for Computing Machinery, New York, NY, USA, 38–49. https://doi.org/10.1145/2786805.2786849 10.1145/2786805.2786849 Miltiadis Allamanis, Earl T. Barr, Christian Bird, and Charles Sutton. 2015. Suggesting Accurate Method and Class Names. In 2015 Joint Meeting on Foundations of Software Engineering (Bergamo, Italy) (ESEC/FSE ’15). Association for Computing Machinery, New York, NY, USA, 38–49. https://doi.org/10.1145/2786805.2786849
4. code2vec: learning distributed representations of code
5. A Comparison of Open-Source Static Analysis Tools for Vulnerability Detection in C/C++ Code