1. CVE-2016-4437 [Online] Available: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4437 CVE-2016-4437 [Online] Available: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4437
2. Ian Haken Automated Discovery of Deserialization Gadget Chains [Online] Available: https://i.blackhat.com/us-18/Thu-August-9/us-18-Haken-Automated-Discovery-of-Deserialization-Gadget-Chain-wp.pdf. Ian Haken Automated Discovery of Deserialization Gadget Chains [Online] Available: https://i.blackhat.com/us-18/Thu-August-9/us-18-Haken-Automated-Discovery-of-Deserialization-Gadget-Chain-wp.pdf.
3. Jang-Wu Jo and Byeong-Mo Chang , "Constructing control flow graph that accounts for exception induced control flows for Java," 7th Korea-Russia International Symposium on Science and Technology , Proceedings KORUS 2003 . (IEEE Cat. No.03EX737) , 2003 , pp. 160 - 165 vol. 2 . Jang-Wu Jo and Byeong-Mo Chang, "Constructing control flow graph that accounts for exception induced control flows for Java," 7th Korea-Russia International Symposium on Science and Technology, Proceedings KORUS 2003. (IEEE Cat. No.03EX737), 2003, pp. 160-165 vol.2.
4. TAJ
5. Efficient character-level taint tracking for Java