K. Sen, D. Marinov, and G. Agha, Cute: a concolic unit testing engine for C, ACM Int'l Symp. on Foundations of Software Engineering, pp.263-272, 2005.

G. C. Necula, S. Mcpeak, S. P. Rahul, and W. Weimer, CIL: Intermediate Language and Tools for Analysis and Transformation of C Programs, Compiler Construction, pp.213-228, 2002.
DOI : 10.1007/3-540-45937-5_16

H. Perl, S. Dechand, M. Smith, D. Arp, F. Yamaguchi et al., VCCFinder, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.426-437, 2015.
DOI : 10.1145/2810103.2813604

F. Yamaguchi, A. Maier, H. Gascon, and K. Rieck, Automatic Inference of Search Patterns for Taint-Style Vulnerabilities, 2015 IEEE Symposium on Security and Privacy, pp.797-812, 2015.
DOI : 10.1109/SP.2015.54

F. Yamaguchi, N. Golde, D. Arp, and K. Rieck, Modeling and Discovering Vulnerabilities with Code Property Graphs, 2014 IEEE Symposium on Security and Privacy, pp.590-604, 2014.
DOI : 10.1109/SP.2014.44

H. Oh, W. Lee, K. Heo, H. Yang, and K. Yi, Selective context-sensitivity guided by impact pre-analysis, ACM SIGPLAN Notices, vol.49, issue.6, pp.475-484, 2014.
DOI : 10.1145/2666356.2594318

H. Li, H. Kwon, J. Kwon, and H. Lee, CLORIFI: software vulnerability discovery using code clone verification, Concurrency and Computation: Practice and Experience, vol.51, issue.1, 2015.
DOI : 10.1002/cpe.3532

D. Wheeler, Flawfinder, Access http, 2011.

M. Kim, Y. Kim, and Y. Jang, Industrial Application of Concolic Testing on Embedded Software: Case Studies, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation, pp.390-399, 2012.
DOI : 10.1109/ICST.2012.119

C. Cadar, D. Dunbar, and D. Engler, Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs, USENIX Symp. on Operating Systems Design and Implementation, pp.209-224, 2008.

D. Zhang, D. Liu, Y. Lei, D. Kung, C. Csallner et al., Detecting vulnerabilities in c programs using trace-based testing, IEEE/IFIP Int'l Conf. on Dependable Systems and Networks, pp.241-250, 2010.

A. Broder and M. Mitzenmacher, Network Applications of Bloom Filters: A Survey, Internet Mathematics, vol.1, issue.4, pp.485-509, 2004.
DOI : 10.1080/15427951.2004.10129096

T. Boland and P. Black, Juliet 1.1 C/C++ and Java Test Suite, Computer, vol.45, issue.10, pp.89-90, 2012.
DOI : 10.1109/MC.2012.345

F. Yamaguchi, C. Wressnegger, H. Gascon, and K. Rieck, Chucky, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.499-510, 2013.
DOI : 10.1145/2508859.2516665

J. Burnim and K. Sen, Heuristics for Scalable Dynamic Test Generation, 2008 23rd IEEE/ACM International Conference on Automated Software Engineering, pp.443-446, 2008.
DOI : 10.1109/ASE.2008.69