1. Andreas Blass and Yuri Gurevich. Inadequacy of Computable Loop Invariants. ACM Trans. Comput. Logic, 2(1):1--11, January 2001.
2. F. Bobot, Filliâtre J., C. Marché, and A. Paskevich. Why3: Shepherd Your Herd of Provers. In Boogie 2011: First International Workshop on Intermediate Verification Languages, pages 53--64. Microsoft Research, 2011.
3. D. Brumley, T. Chiueh, R. Johnson, H. Lin, and D. Song. RICH: Automatically Protecting against Integer-based Vulnerabilities. In Network and Distributed Systems Security, 2007.
4. C. Cadar, V. Ganesh, P. Pawlowski, D. Dill, and D. Engler. EXE: Automatically Generating Inputs of Death. In 13th ACM conference on Computer and Communications Security, pages 322--335. ACM, 2006.
5. Dustin Childs. KB2839011 Released to Addresss Security Bulletin Update Issue. Microsoft Security Response Center, April 2013.