1. FirmFuzz
2. Toward the analysis of embedded firmware through automated re-hosting;gustafson;Proceedings of the 22nd International Symposium on Research in Attacks Intrusions and Defenses (RAID),2019
3. Cve-2017-1000112: Exploitable memory corruption due to ufo to non-ufo path switching;konovalov,2017
4. S2E
5. Scalable, behavior-based malware clustering;bayer;Proceedings of the Network and Distributed System Security Symposium (NDSS),2009