1. [1] U. Bayer, E. Kirda, and C. Kruegel, “Improving the efficiency of dynamic Malware analysis,” Proc. 2010 ACM Symposium On Applied Computing, pp.1871-1878, March 2010.
2. [2] C. Nagy and S. Mancoridis, “Static security analysis based on input-related software faults,” Proc. 2009 European Conference on Software Maintenance and Reengineering, pp.37-46, March 2009.
3. [3] K. Pattabiraman, Z. Kalbarczyk, and R.K. Iyer, “Automated derivation of application-aware error detectors using static analysis: The trusted illiac approach,” IEEE Trans. Dependable and Secure Computing, vol.11, June 2009.
4. [4] H. Saidi, “Logical foundation for static analysis: Application to binary static analysis for Security,” ACM SIGAda Ada Letters, vol.28, no.1, pp.96-102, April 2008.
5. [5] The IDA Pro Dissasember and Debugger, http://www.hex-rays.com/idapro/