1. Angr. 2018. Programming SimProcedures. angr. https://docs.angr.io/extending-angr/simprocedures Angr. 2018. Programming SimProcedures. angr. https://docs.angr.io/extending-angr/simprocedures
2. Gogul Balakrishnan and Thomas Reps . 2008. Analyzing stripped device-driver executables . In Tools and algorithms for the construction and analysis of systems, C. R . Ramakrishnanand Jakob Rehof (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 124–140. Gogul Balakrishnan and Thomas Reps. 2008. Analyzing stripped device-driver executables. In Tools and algorithms for the construction and analysis of systems, C. R. Ramakrishnanand Jakob Rehof (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 124–140.
3. Armin Biere , Alessandro Cimatti , Edmund M Clarke , Ofer Strichman , and Yunshan Zhu . 2009. Bounded Model Checking.Handbook of satisfiability 185, 99 ( 2009 ), 457–481. Armin Biere, Alessandro Cimatti, Edmund M Clarke, Ofer Strichman, and Yunshan Zhu. 2009. Bounded Model Checking.Handbook of satisfiability 185, 99 (2009), 457–481.
4. Ruben Boonen. 2017. Part 19: Kernel Exploitation -> Logic bugs in Razer rzpnk.sys. FuzzySecurity. https://www.fuzzysecurity.com/tutorials/expDev/23.html Ruben Boonen. 2017. Part 19: Kernel Exploitation -> Logic bugs in Razer rzpnk.sys. FuzzySecurity. https://www.fuzzysecurity.com/tutorials/expDev/23.html
5. Cristian Cadar , Daniel Dunbar , and Dawson Engler . 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In 17th USENIX Security Symposium (USENIX Security 08) (San Diego, California) (OSDI’08). USENIX Association, USA, 209–224. Cristian Cadar, Daniel Dunbar, and Dawson Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In 17th USENIX Security Symposium (USENIX Security 08) (San Diego, California) (OSDI’08). USENIX Association, USA, 209–224.