P. Amini, PaiMei and the five finger exploding palm RE techniques, presented at REcon (www.recon.cx/en/s/pamini, 2006.

P. Amini, Sulley: Pure Python fully automated and unattended fuzzing framework (code.google.com, 2010.

S. Bratus, A. Hansen, and A. Shubina, LZFuzz: A Fast Compression- Based Fuzzer for Poorly Documented Protocols, 2008.

J. Cache, H. Moore, and M. Miller, Exploiting 802, 2007.

C. Cadar, V. Ganesh, P. Pawlowski, D. Dill, and D. Engler, EXE, ACM Transactions on Information and System Security, vol.12, issue.2, pp.1-38, 2008.
DOI : 10.1145/1455518.1455522

S. Convery, Hacking Layer 2: Fun with Ethernet switches, presented at the BlackHat USA Conference (www.blackhat.com/presentations/bh-usa- 02/bh-us-02-convery-switches, 2002.

G. Devarajan, Unraveling SCADA protocols: Using Sulley fuzzer, presented at the DefCon 15 Hacking Conference, 2007.

D. Bond, ICCPSic assessment tool set released, Sunrise, Florida (www .digitalbond.comiccpsic-assessment-tool-set-released), 2007.

M. Eddington, Peach Fuzzing Platform (peachfuzzer.com), 2010.

D. Kaminsky, Black ops: Pattern recognition, presented at the BlackHat USA Conference (www.slideshare.net, 2006.

H. Meer, Memory corruption attacks: The (almost) complete history, presented at the BlackHat USA Conference (media.blackhat.com/bh-us- 10USA-2010-Meer-History-of-Memory-Cor ruption-Attacks-wp, 2010.

B. Miller, L. Fredriksen, and B. So, An empirical study of the reliability of UNIX utilities, Communications of the ACM, vol.33, issue.12, pp.32-44, 1990.
DOI : 10.1145/96267.96279

C. Miller and Z. Peterson, Analysis of Mutation and Generation-Based Fuzzing, White Paper, Independent Security Evaluators, 2007.

C. Nevill-manning and I. Witten, Identifying hierarchical structure in sequences: A linear-time algorithm, Journal of Artificial Intelligence Research, vol.7, pp.67-82, 1997.

F. Raynal, E. Detoisien, and C. Blancher, arp-sk: A Swiss knife tool for ARP (sid.rstack.org/arp-sk), 2004.

J. Roning, M. Laakso, A. Takanen, and R. Kaksonen, PROTOS: Systematic approach to eliminate software vulnerabilities, presented at Microsoft Research, 2002.

J. Ziv and A. Lempel, A universal algorithm for sequential data compression, IEEE Transactions on Information Theory, vol.23, issue.3, pp.337-343, 1977.
DOI : 10.1109/TIT.1977.1055714

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.8921