1. Hachoir. http://bitbucket.org/haypo/hachoir/wiki/Home.. Hachoir. http://bitbucket.org/haypo/hachoir/wiki/Home..
2. LLVM Basic Alias Analysis Pass. http://llvm.org/docs/AliasAnalysis.html#the-basicaa-pass... LLVM Basic Alias Analysis Pass. http://llvm.org/docs/AliasAnalysis.html#the-basicaa-pass...
3. The LLVM compiler infrastructure. http://www.llvm.org/. The LLVM compiler infrastructure. http://www.llvm.org/.
4. D. Brumley T. Chiueh R. Johnson H. Lin and D. Song. Rich: Automatically protecting against integer-based vulnerabilities. Department of Electrical and Computing Engineering page 28 2007. D. Brumley T. Chiueh R. Johnson H. Lin and D. Song. Rich: Automatically protecting against integer-based vulnerabilities. Department of Electrical and Computing Engineering page 28 2007.
5. Creating Vulnerability Signatures Using Weakest Preconditions